We are electronic evidence experts

"The records and evidence uncovered by your organization proved to be the decisive factor in the litigation, and gave our organization tremendous leverage in the settlement process."

Christopher S. Miller
Chief Executive Officer, Conrad Kacsik
Solon (Cleveland), Ohio

Members

Forgot Username or Password

Events


04/30/2014- 12:00 Information In-Security

Vestige Views

As part of Vestige's on-going commitment to educating our clients, potential end-users and our peers in the industry, Vestige Views blog reflects some of the industry's foremost thought leadership.

Understanding the IT Assessment Process

Posted by Damon Hacker
Damon Hacker
A co-founder of Vestige, Damon has over 20 years experience working with technology. For more than 15 years, h...
User is currently offline
on Monday, 14 April 2014
in Business Management

Continuing with this month’s theme on IT Assessments, we will pick up this week where we left off.  Last week we looked at why you might want to consider an IT Assessment, discussed a framework for discussing and thinking about IT Assessments and introduced some terminology such that we can explore this area in more depth.  This week, I am looking at how the Assessments are conducted and what an organization can expect in going through an Assessment.  I’ll leave the tail-end of the discussion to things to consider when choosing who to provide such Assessments.

Tags: Untagged
Hits: 125 0 Comments
0 votes

An Introduction to IT Assessments

Posted by Damon Hacker
Damon Hacker
A co-founder of Vestige, Damon has over 20 years experience working with technology. For more than 15 years, h...
User is currently offline
on Sunday, 06 April 2014
in Business Management

For those of you who have read previous articles, blogs or have had the opportunity to hear me present on the topic of Information Security, you will no doubtedly recognize today’s theme.  While it is absolutely true that ownership/management at some organizations choose to put their heads in the sand when it comes to security within Information Technology, the vast majority don’t intentionally ignore it; rather, they falsely believe that it is adequately being handled within their existing IT structure.  Read along to find out why believing that may put your organization in jeopardy and what you can do about it.

Tags: Untagged
Hits: 107 0 Comments
0 votes

Building a Timeline of Activity

Posted by Damon Hacker
Damon Hacker
A co-founder of Vestige, Damon has over 20 years experience working with technology. For more than 15 years, h...
User is currently offline
on Friday, 28 February 2014
in Business Management

One of the great things about enjoying a reputation of being problem solvers is the fact that clients oftentimes contact us for any and all of their digital evidence needs, even if they don't necessarily know exactly how we might be able to assist.  And this doesn't just come from those tech-savvy individuals.  Actually, sometimes it's the ones that aren't the most accomplished technologists that don't artificially dismiss an idea -- but instead bring it to us to see if we can assist.  Building a timeline of activity of what individuals have done by looking at the digital evidence is one such area where we've been called upon a number of times and the caller on the other end of the line doesn't quite know what they're looking for, whether it's something we can do or not, but they have this idea...

Tags: Untagged
Hits: 194 0 Comments
0 votes

Employee Habits in the Workplace

Posted by Gene Snyder
Gene Snyder
Gene is a Forensic Analyst and has been a part of the Vestige team for nearly two years. He has experience in ...
User is currently offline
on Friday, 07 February 2014
in Business Management

This week’s blog post discusses a matter that can be a battle for many companies: determining if their employees are actually working when they should be or if they are engaging in other extracurricular activities that should be saved for time spent elsewhere. When taken at face value, this can be a daunting task for the employer. Digital forensics to the rescue!

Tags: Untagged
Hits: 185 0 Comments
0 votes

Pre-Breach Assessments

Posted by Damon Hacker
Damon Hacker
A co-founder of Vestige, Damon has over 20 years experience working with technology. For more than 15 years, h...
User is currently offline
on Friday, 10 January 2014
in Business Management

It used to be that organizations’ information (either its own, or data that was entrusted to the organization) was relatively safe.  In the days before computers and the popularity of the Internet, someone could physically remove information.  For that part, even that could happen today.  But let’s face it, in today’s information-crazed economy, data is ubiquitous and information is golden.  Gaining access to it and stealing it is no longer a rare event, either.  Nor is it isolated to larger companies or companies that have “sexy” data (yes, I did just use those two words in the same sentence).  If you don’t believe that your organization is a target, then you must read my article “Protect Your Data”, in this month’s Smart Business Magazine.

In fact, it is not a question of “If”, but rather a question of “when” your organization will be faced with a data breach.  Your job, therefore, is to get that risk as low as possible and to make the impact of a data breach as low as possible when it does occur.

Tags: Untagged
Hits: 269 0 Comments
0 votes

Intellectual Property Theft: Analyzing the ex-Employee's Newly Issued & Personal Devices

Posted by Gene Snyder
Gene Snyder
Gene is a Forensic Analyst and has been a part of the Vestige team for nearly two years. He has experience in ...
User is currently offline
on Thursday, 12 December 2013
in Business Management

Let’s say that you’re the head of the IT department and that Employee A has already left your company and went to work for a competitor. Before leaving, he turned over his business laptop to you, but nothing else. You were well prepared in that you immediately had his laptop preserved after he handed it in, and you’ve hired Vestige to determine what, if anything, he may have taken. Vestige analyzes his computer and discovers he inserted several USB devices just a few days before leaving, and while discussing the results of the investigation with an analyst, you determine that the filenames recorded by the operating system as being accessed from those devices are indicative of company-sensitive material. What do you do now?

 

Tags: Untagged
Hits: 389 0 Comments
0 votes

Intellectual Property Theft: Analyzing the "Victim" Organization's Devices

Posted by Damon Hacker
Damon Hacker
A co-founder of Vestige, Damon has over 20 years experience working with technology. For more than 15 years, h...
User is currently offline
on Friday, 06 December 2013
in Business Management

In this month’s Vestige View blog series, we are going to be focusing on one specific type of matter that we seem to always work – IP Theft / Non-Compete matters.  Join us this week as we explore the benefits of examining the devices of the victim organization and just what can be gleaned from those – even though the actual evidence stolen is no longer in the victim’s possession.

Tags: Untagged
Hits: 135 0 Comments
0 votes

Deleted Still Isn't Deleted

Posted by Greg Kelley
Greg Kelley
As a co-founder of Vestige and its current CTO, Greg is instrumental to Vestige’s forensic and e-Discovery ser...
User is currently offline
on Monday, 28 November 2011
in Business Management

Not a week goes by that I am not talking with a client about some computer forensic matter when the conversation drifts into discussions of how data is deleted. A few minutes later and the client says "well, I guess deleted isn't deleted".

Tags: Untagged
Hits: 835 0 Comments
0 votes

Proactive vs Reactive Security

Posted by Damon Hacker
Damon Hacker
A co-founder of Vestige, Damon has over 20 years experience working with technology. For more than 15 years, h...
User is currently offline
on Friday, 29 July 2011
in Business Management

Although your mother always told you to learn from others' mistakes, that is a tall order when having to make choices between which activities you're going to commit your scarce resources to. Like many things, when it comes to IT security, once the cat is out of the bag the costs of not having adequate security is always astronomically higher than you originally imagined.

Tags: Untagged
Hits: 723 0 Comments
0 votes