Book a Demo

BLOG

See the latest news and insights around Information Governance, eDiscovery, Enterprise Collaboration, and Social Media. 

10 Forms of Social Media Bullying and Harassment to Watch Out For

As social media usage has increased, so have the different types of abuse, harassment, bullying, and defamation victims can face online. One of the most powerful tools to combat this growing trend is education, making it easier to handle situations that can suddenly materialize. This blog discusses the ten forms of social media bullying and harassment by offering concrete examples and insights into its many forms.

10 Ways to Protect Yourself from Social Media Abuse and Harassment

Since the beginning of social media, people from all over have been able to share their thoughts and ideas. The dark side of this revolutionary change is that not everyone has something kind to say, which makes protecting yourself against social media harassment critical.

When Fake Electronic Evidence Is Used in Court

With the digital realm increasingly shaping both our personal and professional lives, the rise of electronic evidence in legal cases was inevitable. But as technology advances, so do the methods for creating fake digital evidence, posing significant challenges for courts.

How to Use TikTok In OSINT & SOCMINT Investigations

We’re used to seeing people post incredible amounts of personal information on platforms like Facebook, LinkedIn, Instagram, Strava, Twitter, etc. But now, another platform must be added to that list: TikTok.

WebPreserver Supports Collections of TikTok

WebPreserver now supports collections of TikTok! Starting today, all WebPreserver users have access to similar features and capabilities that we offer for evidence collection on popular platforms like Facebook, Instagram, and Twitter. This is a standard function available to all customers, who will now be able to:

What Is Doxxing? And How Can You Prevent It?

With its roots in hacker communities of the 1990s, today, doxxing remains a widespread cybersecurity issue. If anything, the problem is growing. 21% of Americans (more than 43 million individuals) report having personally experienced doxxing. An even greater number, 62%, personally knew someone who had been the victim of a doxxing attack.

eDiscovery: Frequently Asked Questions

Traditional discovery is the initial phase of litigation when all parties are required to provide records and evidence relevant to a specific case. However, thanks to the explosion of electronically stored information (ESI), discovery must now work alongside eDiscovery—a process that involves the identification, preservation, collection, retention, and review of data in an electronic format. This makes the discovery exponentially larger and more complex.

Combating ransomware attacks with dark web investigations

Ransomware attacks are on the rise, but sophisticated dark web forensics and tools are helping investigators to transform the dark web from a murky and lawless online environment, into a treasure trove of evidence and information. In the 1900s, organised crime was personified by Al Capone, Frank Costello and John Gotti — infamous names that are still known today, even though they operated in a limited geographical area.

How Optical Character Recognition (OCR) Revolutionizes eDiscovery and Online Investigations

Businesses generate documentation and data at a rapid pace, both on and offline. Industries like banking and the financial sector regularly manage thousands of different types of documents. Keeping up with this cumulative documentation can be difficult and costly. A digitized, paperless business can mean an increasing organization, work efficiency and more accurate data.

What Is Chain Of Custody?

Chain of custody, in a legal context, can refer to both physical and electronic evidence. With the huge increase in the leverage of the latter within litigation cases, today, chain of custody is a key requirement of any eDiscovery process.

    Related Posts