Welcome to Vestige Digital Investigations Case Studies page. Here we provide you with actual Case Studies as well as Representative Matters that provide a sampling of the types of matters in which Vestige has been engaged to perform work. You’ll see that Vestige provides a wide array of case types and a deep knowledge and experience in the digital field that help to provide successful outcomes for our clients.

7 Steps to Prevent Shadow I.T.

Summary: A rapidly growing trend, “Shadow IT” is the use of unapproved IT systems and solutions within organizations. End users are increasingly bypassing IT in favor of third party solutions and services. However, stopping Shadow IT isn’t as easy as flipping a switch. In this article, we explore the steps you must take in order to prevent Shadow IT in your organization.

Look for Vestige’s Ad in the Crain’s Cleveland Business Book of Lists. This is a sought-after annual publication that is a data resource culmination of Crain’s year-round efforts to gather details on the top businesses in Northeast Ohio.  It is comes out Dec. 26, 2016.   DOWNLOAD WHITEPAPER: Electronic Devices Are Witnesses    

Passwords are a significant commodity that are traded in the darkest corners of the internet because many people use the same password for multiple accounts. When paired with an email address, this can give a hacker access to your personal email, Facebook, financial information and more.