Surprise!

Recently, we received a hard drive for investigation as part of litigation.  This drive had come from the work computer of an employee terminated by our client six months prior, now the subject of the litigation. When we received the drive, it was apparent that it had been tampered with.  Hard drives typically come with stickers …

Two Common Pitfalls of Encryption

Technology follows a predictable path as it develops.  New technologies are developed to address a small, but specific criteria.  Over time, the user-friendliness of the technology increases, leading to adoption by a larger portion of the userbase.  Eventually, the technology is easy enough to use that nearly everyone is a user. Email is an example of a technology …