See the latest news and insights around Information Governance, eDiscovery, Enterprise Collaboration, and Social Media.
With the rise of social media, individuals have become increasingly comfortable sharing personal information online. However, this has also made them susceptible to social media impersonation, a growing phenomenon that can lead to identity theft and other online fraud. Impersonators can easily create fake profiles and use stolen personal information to deceive others. They may use this information to gain access to private accounts or even steal money.
With the rise of social media, individuals have become increasingly comfortable sharing personal information online. However, this has also made them susceptible to social media impersonation, a growing phenomenon that can lead to identity theft and other
Cyberbullying has become a prevalent issue since the internet's inception, and its various forms make it difficult to prevent. In this blog, we'll explore what cyberbullying is and how to prevent it.
The right social media intelligence tools can be the key to finding that "smoking gun" in an ever-growing sea of online data. This blog looks at the top seven open-source intelligence (OSINT), or social media intelligence (SOCMINT), tools crucial for onli
As social media usage has increased, so have the different types of abuse, harassment, bullying, and defamation victims can face online. One of the most powerful tools to combat this growing trend is education, making it easier to handle situations that c
Since the beginning of social media, people from all over have been able to share their thoughts and ideas. The dark side of this revolutionary change is that not everyone has something kind to say, which makes protecting yourself against social media har
With the digital realm increasingly shaping both our personal and professional lives, the rise of electronic evidence in legal cases was inevitable. But as technology advances, so do the methods for creating fake digital evidence, posing significant chall
We’re used to seeing people post incredible amounts of personal information on platforms like Facebook, LinkedIn, Instagram, Strava, Twitter, etc. But now, another platform must be added to that list: TikTok.
WebPreserver now supports collections of TikTok! Starting today, all WebPreserver users have access to similar features and capabilities that we offer for evidence collection on popular platforms like Facebook, Instagram, and Twitter. This is a standard f
What happens when online harassment crosses the digital divide? For several years now, the practice of swatting has been on the rise, and featured in news stories the world over. What exactly does the practice entail? What are the legal consequences of sw
With its roots in hacker communities of the 1990s, today, doxxing remains a widespread cybersecurity issue. If anything, the problem is growing. 21% of Americans (more than 43 million individuals) report having personally experienced doxxing. An even grea
SHA-256 is one of the most widely used cryptographic hashing algorithms, playing a crucial role in securing digital information. Part of the Secure Hash Algorithm 2 (SHA-2) family, SHA-256 ensures data integrity, safeguards sensitive information, and authenticates digital evidence and records in legal and compliance scenarios.
These days, you'd be hard-pressed to find an business that isn't advertising on social media. But when it comes to financial service providers, social media marketing can become a double-edged sword, or worse a compliance nightmare that results in major fines from the SEC, FINRA or the FTC.
Head Office:
#500-311 Water Street
Vancouver, BC V6B 1B8
Canada
Europe Office:
Van Leeuwenhoekpark 1
2611 DW, Delft
The Netherlands
UK Office:
+44 20 3744 7173
Australia Office:
+61 (07) 3186 2199
© 2025 Pagefreezer Software Inc. All Rights Reserved. Privacy Policy and Acceptable Use Policy. Commercial use and distribution of the contents of this website is not allowed without express and prior written consent of Pagefreezer Software Inc. subject to existing copyright exceptions and limitations.