Forensic Technology Blog

In today's rapidly changing world, our Forensic Technology Team continues to expand to meet client demands. Our experts have more than 100 years of experience working on 100-plus cases, ranging from single-computer digital forensics to complex data analytics numbering in the billions of transactions.
We established our leading-edge Computer Forensics Lab in 2015 in Sacramento, California. Within the secure walls of The Lab, we host powerful database servers for complex data analytics, eDiscovery processing and review platforms, and develop custom innovative software solutions for our clients’ specialized needs. We are continually updating The Lab to keep pace with technology so we can efficiently search increasingly larger amounts of data and provide our clients with critical information and knowledge that results in the successful resolution of their cases.
Forensic Technology Services include the following:

  • Digital Forensics, including computer analysis and cybersecurity
  • eDiscovery, including data collections and hosting
  • Complex Data Analytics, including transaction analysis
  • IT Expert Services, including technology disputes and systems consulting

We are excited to see this practice area grow, and we welcome the opportunity to share some of our success stories with you.

Blogs June 20, 2019 Information Security in the Real Estate Environment

An EisnerAmper cybersecurity event geared specifically to the real estate sector. The expert panel conveyed the costs of NOT having a proactive cybersecurity plan as well as tips for developing a successful program.

Blogs November 01, 2018 The Tools to Minimize and Respond to and Cyber Threats

Thomson Reuters recently held their 17th Annual Law Firm CFO & COO Forum. One well-attended session, “A Swift and Measured Response: Organizational & Client-Focused Responses After a Cyber Incident,” featured a panel of experts.

Blogs March 21, 2018 GDPR Could Have Far-Reaching Impact on Fund Managers

The European Union launched a strict set of rules called General Data Protection Regulation and both E.U. fund managers and those outside the E.U. that have access to European data need to know about them in order to comply by the May 25 deadline.

Blogs January 19, 2018 Private Equity Breakfast Roundtable: Cybersecurity Breaches. Not If…When

At a recent Private Equity Breakfast co-hosted by EisnerAmper and law firm Bracewell LLP, a quartet of speakers emphasized measures companies need to implement to be in the best position possible to prevent data breaches.

Blogs September 21, 2017 Service Provider Spotlight: September 21, 2017

Threats to private equity firms continue to grow both in scope and sophistication. Cyber strategies and practices require equally complex and progressive thought. Here are strategies and protections firms can employ to thwart cyber attacks.

Blogs July 06, 2017 EisnerAmper LLP: Alternative Investment Summit

At our second annual Alternative Investment Summit in New York, panelists discussed the pros and cons of the top strategy today: quantitative hedge funds. Today, the most sought-out hedge fund strategy is quantitative analysis.

Blogs March 22, 2017 Cuomo Announces Strengthened Cybersecurity Requirements

It is getting harder to navigate and comply with changing regulatory requirements and companies should partner with reputable cybersecurity experts to develop an effective strategy for staying up-to-date on cybersecurity threats.

Blogs February 22, 2017 10 Password Tips to Help You Sleep Better at Night

According to Cloudswave, more than 8 million Americans become victims of stolen passwords annually -- to the tune of $37 billion in losses. By taking a few extra steps, you can greatly increase the security of your online presence.

Blogs November 02, 2016 Risks Confronting Boards: Level of Confidence in the Management of Risk by the Organization’s Leadership (Part III)

Not-for-profit boards rank senior management succession planning as their top concern. Directors of public and private organizations rank it as their second most significant concern. So, how is something of such concern being managed?