Major Cases Helped by Digital Forensics: The Casey Anthony Trial
One of the most publicized cases in a long time, the Casey Anthony trial has involved a variety of expert witnesses. Last week the prosecution called for the testimony of a computer forensic expert...
View ArticleAn Employee’s Revenge: The Perfect Reason for Implementing Strong Internal...
Most companies have adequate fair use policies and rules that govern how user accounts, and their related access rights, are handled upon termination of employment. However, a recent news story should...
View ArticleThe Next Hacking Epidemic: Curiosity
A wide variety of items can be found discarded on the street, and some – such as a wallet, cell phone, or USB thumb drive – can prove quite valuable, or even malicious. A curious person walking by who...
View ArticleElectronic Discovery: Is it Worth the Cost?
Electronic Discovery (e-discovery) has become a common method of obtaining information for a wide variety of legal investigations. However, the potential costs of e-discovery are causing many...
View ArticleComputer Forensics: An Important Tool for Uncovering Fraud
In a world so dependent on technology, it is becoming more important than ever for computers to be investigated as part of accounting fraud cases. It may be obvious to assume that when looking at a...
View ArticleHow a Forensic Accountant can aid in Divorce Settlements (Video)
Complicated financial issues often come into play during a divorce settlement, and even more so in high net worth cases. It’s common for one spouse to assume the money management role in a marriage,...
View ArticleHow do you capture or recover electronic evidence on computers and cell phones?
New technologies mean evidence of fraud may be electronic, hidden and difficult to detect. How do you capture or recover electronic evidence on computers and cell phones? Obviously, an investigator...
View ArticleWhat are the legal issues surrounding the collection, analysis and protection...
No doubt that electronic data can be useful in litigation, but how does its collection, analysis and protection affect its legal use? The key point is what is known as the “chain of custody.” If...
View ArticleBusiness Cybersecurity Basics: Protecting Your Company from Hackers
As an executive, what keeps you up at night? Many leaders fret about revenue growth, client retention, and, increasingly, the possibility of fraud or cyberattacks. If you are worried about your...
View ArticleHow to Use Social Media to Support Your Fraud Case
The invasion of social media continues to complicate litigation. Effective litigation will increasingly include sifting through large amounts of electronically stored information (ESI) and piecing...
View Article