We are electronic evidence experts

"I appreciate the knowledge that Greg and Damon possess, and your ability to communicate it in a way that is understandable. Your work is top-notch, and I look forward to working with you again soon."

Betty White, Paralegal
Sebally, Shillito + Dyer LPA
Dayton, Ohio

Members

Forgot Username or Password

Vestige Views

As part of Vestige's on-going commitment to educating our clients, potential end-users and our peers in the industry, Vestige Views blog reflects some of the industry's foremost thought leadership.

It's Getting Personal

Posted by Greg Kelley
Greg Kelley
As a co-founder of Vestige and its current CTO, Greg is instrumental to Vestige’s forensic and e-Discovery ser...
User is currently offline
on Thursday, 17 July 2014
in Business Management

A couple of recent articles (http://www.lawtechnologynews.com/home/id=1202663383073 and http://www.lawtechnologynews.com/id=1202663062087) in Law Technology News have attempted to bring to readers’ attention the fact that hackers are attempting to get at personal data.  However, this time, it is not the personal data of customers, but instead it is the personal data for employees at a company.  In this blog we will talk about the implications of such a theft and more importantly we will follow-up with how that can pertain to you and your company.

Tags: Untagged
Hits: 93 0 Comments
0 votes

Of IRS and Crashed Computers

Posted by Greg Kelley
Greg Kelley
As a co-founder of Vestige and its current CTO, Greg is instrumental to Vestige’s forensic and e-Discovery ser...
User is currently offline
on Wednesday, 09 July 2014
in Business Management

The latest foray into geekdom by the national media involves the story of the IRS, Lois Lerner and some lost emails.  The story underscores a couple of valid points that we have been making here on the Vestige blog.  Now that the story has gone mainstream it pays to revisit the points we’ve made and apply them to the dilemma at hand.

Tags: Untagged
Hits: 144 0 Comments
0 votes

Insights from the Verizon Data Breach Investigations Report

Posted by Greg Kelley
Greg Kelley
As a co-founder of Vestige and its current CTO, Greg is instrumental to Vestige’s forensic and e-Discovery ser...
User is currently offline
on Wednesday, 11 June 2014
in Business Management

About a month ago, Verizon released its annual Data Breach Investigations Report (DBIR).  The report is highly anticipated every year by those of us in the information security field.  But to be honest, there are some takeaways for most people in the corporate world.  Whether you are in IT, company management, HR or an attorney, you’ll find some nuggets of good information in this report.  I’ll try to highlight some of the intelligence provided in the report and how it pertains to you.

Tags: Untagged
Hits: 168 0 Comments
0 votes

After the Assessment: Remediation

Posted by Damon Hacker
Damon Hacker
A co-founder of Vestige, Damon has over 20 years experience working with technology. For more than 15 years, h...
User is currently offline
on Monday, 21 April 2014
in Business Management

After the Assessment:  Remediation

The assessment is now complete and you’ve attended the closing meeting and have received the findings.  Naturally, there are items that need to be addressed.  Even in environments that are well-controlled, there are always things that can be improved.  This week we’ll look at what the findings mean and considerations for remediating the findings.

 

Tags: Untagged
Hits: 171 0 Comments
0 votes

Understanding the IT Assessment Process

Posted by Damon Hacker
Damon Hacker
A co-founder of Vestige, Damon has over 20 years experience working with technology. For more than 15 years, h...
User is currently offline
on Monday, 14 April 2014
in Business Management

Continuing with this month’s theme on IT Assessments, we will pick up this week where we left off.  Last week we looked at why you might want to consider an IT Assessment, discussed a framework for discussing and thinking about IT Assessments and introduced some terminology such that we can explore this area in more depth.  This week, I am looking at how the Assessments are conducted and what an organization can expect in going through an Assessment.  I’ll leave the tail-end of the discussion to things to consider when choosing who to provide such Assessments.

Tags: Untagged
Hits: 231 0 Comments
0 votes

An Introduction to IT Assessments

Posted by Damon Hacker
Damon Hacker
A co-founder of Vestige, Damon has over 20 years experience working with technology. For more than 15 years, h...
User is currently offline
on Sunday, 06 April 2014
in Business Management

For those of you who have read previous articles, blogs or have had the opportunity to hear me present on the topic of Information Security, you will no doubtedly recognize today’s theme.  While it is absolutely true that ownership/management at some organizations choose to put their heads in the sand when it comes to security within Information Technology, the vast majority don’t intentionally ignore it; rather, they falsely believe that it is adequately being handled within their existing IT structure.  Read along to find out why believing that may put your organization in jeopardy and what you can do about it.

Tags: Untagged
Hits: 183 0 Comments
0 votes

Building a Timeline of Activity

Posted by Damon Hacker
Damon Hacker
A co-founder of Vestige, Damon has over 20 years experience working with technology. For more than 15 years, h...
User is currently offline
on Friday, 28 February 2014
in Business Management

One of the great things about enjoying a reputation of being problem solvers is the fact that clients oftentimes contact us for any and all of their digital evidence needs, even if they don't necessarily know exactly how we might be able to assist.  And this doesn't just come from those tech-savvy individuals.  Actually, sometimes it's the ones that aren't the most accomplished technologists that don't artificially dismiss an idea -- but instead bring it to us to see if we can assist.  Building a timeline of activity of what individuals have done by looking at the digital evidence is one such area where we've been called upon a number of times and the caller on the other end of the line doesn't quite know what they're looking for, whether it's something we can do or not, but they have this idea...

Tags: Untagged
Hits: 302 0 Comments
0 votes

Employee Habits in the Workplace

Posted by Gene Snyder
Gene Snyder
Gene is a Forensic Analyst and has been a part of the Vestige team for nearly two years. He has experience in ...
User is currently offline
on Friday, 07 February 2014
in Business Management

This week’s blog post discusses a matter that can be a battle for many companies: determining if their employees are actually working when they should be or if they are engaging in other extracurricular activities that should be saved for time spent elsewhere. When taken at face value, this can be a daunting task for the employer. Digital forensics to the rescue!

Tags: Untagged
Hits: 261 0 Comments
0 votes

Pre-Breach Assessments

Posted by Damon Hacker
Damon Hacker
A co-founder of Vestige, Damon has over 20 years experience working with technology. For more than 15 years, h...
User is currently offline
on Friday, 10 January 2014
in Business Management

It used to be that organizations’ information (either its own, or data that was entrusted to the organization) was relatively safe.  In the days before computers and the popularity of the Internet, someone could physically remove information.  For that part, even that could happen today.  But let’s face it, in today’s information-crazed economy, data is ubiquitous and information is golden.  Gaining access to it and stealing it is no longer a rare event, either.  Nor is it isolated to larger companies or companies that have “sexy” data (yes, I did just use those two words in the same sentence).  If you don’t believe that your organization is a target, then you must read my article “Protect Your Data”, in this month’s Smart Business Magazine.

In fact, it is not a question of “If”, but rather a question of “when” your organization will be faced with a data breach.  Your job, therefore, is to get that risk as low as possible and to make the impact of a data breach as low as possible when it does occur.

Tags: Untagged
Hits: 344 0 Comments
0 votes

Intellectual Property Theft: Analyzing the ex-Employee's Newly Issued & Personal Devices

Posted by Gene Snyder
Gene Snyder
Gene is a Forensic Analyst and has been a part of the Vestige team for nearly two years. He has experience in ...
User is currently offline
on Thursday, 12 December 2013
in Business Management

Let’s say that you’re the head of the IT department and that Employee A has already left your company and went to work for a competitor. Before leaving, he turned over his business laptop to you, but nothing else. You were well prepared in that you immediately had his laptop preserved after he handed it in, and you’ve hired Vestige to determine what, if anything, he may have taken. Vestige analyzes his computer and discovers he inserted several USB devices just a few days before leaving, and while discussing the results of the investigation with an analyst, you determine that the filenames recorded by the operating system as being accessed from those devices are indicative of company-sensitive material. What do you do now?

 

Tags: Untagged
Hits: 473 0 Comments
0 votes

Intellectual Property Theft: Analyzing the "Victim" Organization's Devices

Posted by Damon Hacker
Damon Hacker
A co-founder of Vestige, Damon has over 20 years experience working with technology. For more than 15 years, h...
User is currently offline
on Friday, 06 December 2013
in Business Management

In this month’s Vestige View blog series, we are going to be focusing on one specific type of matter that we seem to always work – IP Theft / Non-Compete matters.  Join us this week as we explore the benefits of examining the devices of the victim organization and just what can be gleaned from those – even though the actual evidence stolen is no longer in the victim’s possession.

Tags: Untagged
Hits: 197 0 Comments
0 votes

Deleted Still Isn't Deleted

Posted by Greg Kelley
Greg Kelley
As a co-founder of Vestige and its current CTO, Greg is instrumental to Vestige’s forensic and e-Discovery ser...
User is currently offline
on Monday, 28 November 2011
in Business Management

Not a week goes by that I am not talking with a client about some computer forensic matter when the conversation drifts into discussions of how data is deleted. A few minutes later and the client says "well, I guess deleted isn't deleted".

Tags: Untagged
Hits: 911 0 Comments
0 votes

Proactive vs Reactive Security

Posted by Damon Hacker
Damon Hacker
A co-founder of Vestige, Damon has over 20 years experience working with technology. For more than 15 years, h...
User is currently offline
on Friday, 29 July 2011
in Business Management

Although your mother always told you to learn from others' mistakes, that is a tall order when having to make choices between which activities you're going to commit your scarce resources to. Like many things, when it comes to IT security, once the cat is out of the bag the costs of not having adequate security is always astronomically higher than you originally imagined.

Tags: Untagged
Hits: 786 0 Comments
0 votes