Forensic Technology Blog

In today's rapidly changing world, our Forensic Technology Team continues to expand to meet client demands. Our experts have more than 100 years of experience working on 100-plus cases, ranging from single-computer digital forensics to complex data analytics numbering in the billions of transactions.
We established our leading-edge Computer Forensics Lab in 2015 in Sacramento, California. Within the secure walls of The Lab, we host powerful database servers for complex data analytics, eDiscovery processing and review platforms, and develop custom innovative software solutions for our clients’ specialized needs. We are continually updating The Lab to keep pace with technology so we can efficiently search increasingly larger amounts of data and provide our clients with critical information and knowledge that results in the successful resolution of their cases.
Forensic Technology Services include the following:

  • Digital Forensics, including computer analysis and cybersecurity
  • eDiscovery, including data collections and hosting
  • Complex Data Analytics, including transaction analysis
  • IT Expert Services, including technology disputes and systems consulting

We are excited to see this practice area grow, and we welcome the opportunity to share some of our success stories with you.

Blogs February 03, 2023 Why Vulnerability Scans Are Important to Evaluate and Secure Your Network

With technology growing faster than ever, businesses need to be secure because as technology advances, so do cyber attacks and threats. Luckily, there is a way to remedy this: Perform a vulnerability scan on your external and internet network assets.

Blogs December 05, 2022 CAPstone: Part II – Baretz+Brunelle

A recap of a recent CAPstone session featuring Poonam Jain of Baretz+Brunelle and our own partners Denise Finney and Rahul Mahna.

Blogs October 21, 2022 How to Have ‘Safe Banking’

In this latest installation from Cybersecurity Corner, you’ll get tips on minimizing risk related to your personal bank accounts.

Blogs October 17, 2022 Mid-Market Tech: Traveling

The first in our Cybersecurity Corner series looks at the ins and outs of travelling and safely accessing the internet.

Blogs October 06, 2022 Why Email Protocol is a Must for Businesses

Email has come a long way, revolutionizing the way people and various organizations interact with each other. However, security breaches tied to unsafe emails are causing billions of dollars in total losses, and the number of victims has increased ex…

Blogs August 22, 2022 Internet of Things: What You Need to Know

Digital assistants and their corresponding devices have become common place in most homes. But with all the convenience they provide, they are also perfect targets for security breaches.

Blogs June 02, 2022 Cybersecurity: How Safe Is Your Family Office?

A recap of an EisnerAmper webinar focused on the cybersecurity concerns facing contemporary family offices, including mitigation strategies.

Blogs May 04, 2022 URL Hijacking – Using a Fake URL to Trick Users

One of the many techniques used by bad actors for social engineering is URL hijacking. This post examines the practice and provides some advice on mitigating that risk.

Blogs April 28, 2022 Endpoint Detection Response (EDR): A New Way to Protect Your Endpoints

This post examines endpoint detection and response, better known as EDR, as an emerging primary security tool to protect company endpoints