Forensic Technology Blog

In today's rapidly changing world, our Forensic Technology Team continues to expand to meet client demands. Our experts have more than 100 years of experience working on 100-plus cases, ranging from single-computer digital forensics to complex data analytics numbering in the billions of transactions.
We established our leading-edge Computer Forensics Lab in 2015 in Sacramento, California. Within the secure walls of The Lab, we host powerful database servers for complex data analytics, eDiscovery processing and review platforms, and develop custom innovative software solutions for our clients’ specialized needs. We are continually updating The Lab to keep pace with technology so we can efficiently search increasingly larger amounts of data and provide our clients with critical information and knowledge that results in the successful resolution of their cases.
Forensic Technology Services include the following:

  • Digital Forensics, including computer analysis and cybersecurity
  • eDiscovery, including data collections and hosting
  • Complex Data Analytics, including transaction analysis
  • IT Expert Services, including technology disputes and systems consulting

We are excited to see this practice area grow, and we welcome the opportunity to share some of our success stories with you.

Blogs August 14, 2020 SEC Registrants: Beware Ransomware

This article takes a look at the types of, and basic defense against, the various types of ransomware. Ransomware is rapidly becoming one of the most popular and formidable types of cyberattack.

Blogs June 09, 2020 CAPstone Webcast Series: Computing Security

This content features a recap of the discussion from EisnerAmper’s (CAP)Stone series webcast titled “Cyber Action Plan – Computing Security,” including topics based on working from home and recognizing trouble spots.

Blogs February 12, 2020 Ahoy! 5 Ways to Spot Email Phishing

The key to preventing phishing email scams is education and awareness—before your electronic security becomes compromised. Here’s a look at five instances that may indicate an email is from a bad actor with nefarious intentions for your data.

Blogs December 02, 2019 Keep Your Smart Home Devices Secure

The Internet of Things means an increased use of smart products in homes—such as automatic lights, thermostats, etc. Here are a few tips for keeping those devices secure so that cyber thieves, as well as in-home/small business burglars, don’t comprom…

Blogs November 15, 2019 Enhanced Security and Risk Mitigation in Today’s World

A Florida Business Summit panel that took a deep dive on cybercrime. The discussion included types of crime (e.g., ransomware), the high stakes involved, and how companies can protect themselves (e.g., cyber insurance).

Blogs October 30, 2019 Important Security Updates for Android Phones and Windows 10 Computers

Security updates for Windows and Android that you should be aware of. These relate to audio, video and image files that could be open to hacking.

Blogs October 17, 2019 Roots of Marriott Breach Run Deep

A review of the root causes and the fallout from the Marriott cyber breach, along with a look at how to mitigate cyber risk at your organization.

Blogs August 26, 2019 Combatting Vulnerabilities in Building Control Systems

How can you combat building control systems attacks? Recommendations include protecting network devices with a firewall, constantly monitoring network traffic for irregular activity, developing patches to the software in a timely manner.

Blogs July 25, 2019 Pair of National Labs Latest to Suffer Unnecessary Data Breaches

Companies that employ best practices for vendor risk management programs utilize technology to organize, synthesize and analyze their vast amounts of data.