Skip to content

Protect Your Android Phone from App Attacks

If you use an Android phone, please take this advice­—now For your protection, never buy apps from any discount sellers and always use a malware or security scanner to weed out problems with software before an infection can occur, according to a new report from G Data Security Labs. For…

Samsung Offers 2TB SSD for Consumers

Samsung has doubled the size of its biggest consumer SSDs and is now selling a 2TB solid-state drive for your desktop computer, rivaling the capacity of more traditional spinning hard disk drives. The new 850 Evo ($799.99) comes with a five-year warranty and the 850 Pro SSD ($999.99) has a…

BYOeDD (Bring Your Own eDiscovery Disaster)

Originally published by Nuix. There are more active mobile devices in the world than human beings—and at least 3 billion of those devices are smartphones. The volume of data these devices generate daily is staggering. They have evolved from “dumb” phones into pocket computers and ultra-thin tablets that can access multiple…

4 Survival Tips For Legaltech West Coast

Originally published by Legaltech News. Legaltech West Coast is right around the corner. Check out these ideas for making the most of it. Legaltech West Coast is right around the corner, on July 13 and 14, in San Francisco. Whether it’s your first visit to this conference or your eleventh, check…

IT Briefcase: Hurricane Season: Electronic Protection Tips

Featured article by Chris Bross, CTO, DriveSavers June 1st marked the start of hurricane season and tropical storms are top of mind for companies in prime locations. Taking preventative measures that businesses can take to protect important data including accounting paperwork, employee documents and sensitive customer information, should be a priority…

How to Handle Anonymously Received but Privileged Documents

Originally published by Compelling Discovery. What do you do if you receive documents from an anonymous source that contain privileged information from your adversary? That is the question Merits Incentives, LLC v. Dist. Ct., 127 Nev. Adv. Op. 63, 262 P.3d 720 (2011) addressed and it is still a topic that…

What Happens to Data After Recovery?

In every successful data recovery, the recovered contents from the affected drive are copied onto another device, often a hard drive. A new flash drive is appropriate for customers with smaller amounts of recovered data. This “target drive” is what we send to the customer in order to return their…

Back To Top
Search