Business Email Compromise Scam: What Is It and How To Guard Against It
The Business Email Compromise (or BEC) scam has been around for many years and seems to be enjoying a resurgence in popularity lately. At its essence, the BEC scam involves ...
Read MoreSharing Devices and Accounts
Sharing Devices and Accounts Unless you live alone, you probably share a device or an account with someone else in your home. Perhaps it’s a family tablet that you and ...
Read MoreSpoliation – Case Terminating Sanctions
Spoliation – Case Terminating Sanctions Case Terminating Sanctions. It’s the spoliation unicorn. The rare event that counsel either dreams of or has nightmares about. In my fifteen-plus years of working ...
Read MoreESI Collections
ESI Collections In a previous post, we set out a general road map for handling the intake of a new ESI (Electronically Stored Information) matter. Frankly, what new matter does ...
Read MoreReflections On The OPM Data Breach
As I sit here reading my data breach notice from the United States Office of Personnel Management regarding their loss of my personal information (name, DOB, SS#), I can’t help ...
Read MoreThe Ponzi Scheme meets Bitcoin
White collar crime and the Ponzi scheme have certainly made their move into the 21st century. Recently, Engadget (www.engadget.com) featured an article about the use of the electronic currency Bitcoin ...
Read MoreClassic Software Tools
As I sit each day gazing into multiple computer monitors, working on various computer forensics or ediscovery projects, it occurs to me that, despite having lots of advanced forensic software ...
Read MoreComputer Forensics – One for the “win” column (v1)
Recently, Peak was asked to assist a law firm who’s client, a large service provider (we will call them “Company A”), had had an account manager leave abruptly and go ...
Read MoreApple Time Machine as a Discoverable Data Source in Forensics and Ediscovery
For years, parties to litigation have been demanding the production of data from various electronic sources. These sources have included desktop computers, laptops, servers, emails, and, most recently, mobile devices ...
Read MoreTWO FACTOR AUTHENTICATION
TWO FACTOR AUTHENTICATION (and why you should care) You may have heard the term “Two Factor Authentication” or seen it as an option while logging into one of your many ...
Read More