Go to Top

Tag Archives

Tag Archives: Cloud

Thank you for making 4Discovery’s “Mobile Discovery: Outsmarting the Smartphone” CLE a huge success!

A great crowd, excellent Q & A, and lively conversation punctuated our cocktail reception CLE in the beautiful library at the Union League Club of Chicago last week. Thank you to our many clients and friends that attended! We can often judge the success of a presentation by the quantity and quality of the Q & A that follows, and this program on mobile device discovery was a good case in …Read More

4Discovery’s Phil Knox to Present at the Illinois Association of School Business Officials Conference

Panel discussion will address school district risks and how to use digital forensics to respond and investigate incidents Fraud, misconduct, sexual harassment, cyberbullying, and data security breaches are just a few of the significant risks facing school districts in our current environment. School business officials have an important legal duty to respond to and investigate these events. 4Discovery, a prominent digital forensics firm, will lead a panel discussion on the use …Read More

4Discovery’s Phil Knox to Present at the Illinois Association of School Business Officials Conference

Panel discussion will address school district risks and how to use digital forensics to respond and investigate incidents Fraud, misconduct, sexual harassment, and data security breaches are just a few of the significant risks facing school districts in our current environment, and school business officials have an important legal duty to respond to and investigate these events. 4Discovery, a prominent digital forensics firm, will lead a panel discussion at the …Read More

Join us in Indianapolis for a special Trade Secret Protection CLE event

Want to learn how to help your clients protect their trade secrets? JOIN US FOR A VERY SPECIAL CLE EVENT: Trade Secret Protection – Using Technology to Safeguard Your Most Valuable Assets When? Wednesday, February 7, 2018 Where? The Columbia Club, Capehart / Riley / Steel Room, 121 Monument Circle, Indianapolis, IN, 46204 5:00PM: Gathering, Networking, Cocktails & Hors d’oeuvres 5:30-6:30PM: CLE Presentation, Q&A ATTENDEES ARE ELIGIBLE FOR ONE GENERAL CLE …Read More

Join us for a very special CLE presentation on Trade Secret Protection

CONSIDER THE STATISTICS Trade secret theft is at an all-time high. Businesses of all sizes face serious risks to their bottom line, competitive position, and even survival. Lawyers face an increasingly complex landscape when it comes to counseling their clients on trade secret protection in our digital world. Up to $480 billion in business losses were attributed to trade secret misappropriation last year 50% of employees that left their jobs in …Read More

Junior Forensic Investigator – Chicago

4Discovery is looking to add an individual to our digital forensic and incident response team in Chicago. Our ideal candidate for this position will have a basic understanding of digital forensic principles, incident response methodologies, and best practices. Knowledge of digital forensic lab practices, procedures, and evidence handling is a plus. Experience with industry digital forensic and investigative tools such as EnCase, X-Ways, FTK, Cellebrite, F-Response, and open source tools …Read More

Shocking Survey Reveals Only 31% of Organizations are Prepared for a Trade Secret Misappropriation

Baker McKenzie Survey Exposes Board-Level Risks that Companies are NOT Prepared For[1] The scenario Your client’s IT Director tells his boss that he has observed suspicious behavior on the company’s network. It seems a senior software code designer for the high-speed securities trading company is downloading massive volumes of proprietary trading software code and copying it to a CD burner. Not good. The employee has recently complained about the strategic …Read More

WannaCry? Your Law Firm Data Security is Only as Good as Your Weakest Vendor

Recent Ransomware Events Highlight Risks & Your Cyber Insurance Policy May Not Cover Losses The WannaCry incident has created a unique opportunity to examine the potential catastrophic impact of ransomware on businesses, and in particular, business interruption considerations. The following scenario is provided as a way to create discussion opportunities with your clients, IT team, attorneys, and risk managers. The Scenario You’re sitting in your office putting the final touches on a …Read More

Hillary Clinton’s eMail Drama: Tips From the Trenches

I am in the digital forensics business.  That means that when something related to eMail or computer evidence is in the news, my friends and family ask me questions, like:  “are Tom Brady’s destroyed “DeflateGate” text messages recoverable?”, and “could you recover data from the submerged mobile phones from missing Malaysian Airlines Flight 370 if it was ever recovered?”  So, I get used to these questions.  It’s kind of fun. …Read More

Retweet Case Raises Free Speech Debate

Can a person be held criminally responsible for “Retweeting” another person’s content, or is such communication protected under The First Amendment’s “Free Speech” language? Communication in our electronic world is bending a number of legal concepts into strange new shapes. Consider Safya Roe Yassin, a 39-year-old citizen that was recently arrested for conspiracy and transmitting threats over state lines.  Her alleged crime?  Retweeting twitter posts from a third party that …Read More