Call Now

215.222.3101
Hot Legal Issues. High-Tech Solutions.
215.222.3101
Contact Us Today

Metadata: The Smoking Gun

Your company’s most senior product developer leaves to join a competitor. Commence panic. What did that employee take with him or her? Commence investigation. When did the employee first plan to leave? What data did the employee have access to within the company? How could the employee potentially have taken confidential information / trade secrets / intellectual property? Commence hiring of digital forensics expert. Digital forensics experts have become part of the litigation strategy in a multitude of growing practice …

Capsicum Group LLC Provides Cybersecurity & Digital Forensics Services for Attorneys in Class Action Context

Capsicum Group, LLC, a technology consulting firm specializing in digital forensics, cybersecurity, and e-discovery, has been busy with a flurry of cybersecurity and digital forensics work in the context of class action lawsuits. Such lawsuits require expert review of digital evidence, including but not limited to: digital backups, website information, programs and databases. Most recently, a class of consumers filed a lawsuit against a chain of retail stores after they allegedly received ads via SMS text message that they either …

Just Text Me: Top 4 Questions Digital Forensics Experts Are Asked Regarding Text Message Evidence

The first text message was sent in 1994, at a time when phones did not have keyboards and the sender had to type the message on an actual computer.  Over the last twenty-three years, text messaging – texting, lol – has quickly become one of the most popular forms of communication. Whether for work or for personal communication, texting is easy, accessible, fast and efficient. Most people feel a wave of anxiety any time they mistakenly forget their phone at …

May 2017 Alert: Ransomware

To all clients and friends of Capsicum Group, LLC: On Friday, the world was hit with one of the most significant, widespread and coordinated ransomware attacks: “WannaCry” aka “WannaCrypt.” Ransomware is a malicious cyber hacker program that locks data up and encrypts data – making it inaccessible to the owner – until a ransom is paid or the data / system is restored. The ransom is typically requested in Bitcoin, an anonymized form of digital currency, and WannaCry is requesting …

Capsicum Group LLC Presents Cyber Crimes, Hackings and How to Guide Your Clients Through a Breach CLE to Multiple Ft. Lauderdale Law Firms; Presents at Philadelphia Bar Association on Digital Forensics and Employment Law

Philadelphia, PA — (SBWIRE) — 04/11/2017 — Capsicum Group, LLC, a technology consulting firm specializing in digital forensics, e-discovery, and cybersecurity in South Florida, was honored to present to multiple Ft. Lauderdale law firms on cyber crime, hacking, and how to guide clients through a breach. The CLE entitled “Cyber Crimes, Hackings, and How to Guide Your Client Through a Breach” reviews the basics of security breach incidents, and the necessity to be able to respond to a breach quickly …

How to Turn Digital Video into a Star Witness

We live in a world in which video surveillance is omnipresent. Nowadays, we hardly bat an eye at finding ourselves reflected in a closed-circuit television (CCTV) screen in a supermarket, or realizing a friend took a video from last week’s brunch and posted it to social media. Video security footage, as well as footage from casual observers, exists in nearly every dimension of society, from law enforcement to the office to the privacy of our own home webcams. When it …

Capsicum Went to Rio by Way of a Telehealth App

If you’re like us, your free time these past few weeks has been spent watching the 2016 Olympics. We never fail to be incredibly impressed by the precision, speed, strength, agility and overall prowess on display by the world’s top athletes. But as we became acutely aware after working with one recent client, the Olympics aren’t just about great athletics. Great medicine, too, plays a significant role in the Olympics, an event that continues to drive medical innovation. Just as …

Summertime Security Tips

As the weather heats up, the kids switch from school to summer camp, and the adults look forward to some well-deserved beach/lake/pool time. Unfortunately hackers don’t take vacation and they may actually have more time on their hands to wreak havoc – so we have some quick summertime security tips to protect your workplace and family from cybercrime: When you’re out of the office on vacation, and using a webcam to monitor your home – make sure you register it, …

Making Smart Decisions in the Early Stages of E-Discovery

In cases where digitally stored information offers definitive evidence, such as corporate fraud or intellectual property theft, the role of e-discovery is crucial. E-discovery is essentially the digital version of paper discovery, and involves the retrieval and review of electronically stored information (ESI). It is a complex and, at times, mundane task, requiring careful planning, data acquisition, review and analysis, secure storage to prevent spoliation, reliable data hosting and the production of documents that can be used in court. Typically, …

Think You Can Get Away Without a Code Review? Think Again.

When discussing security options with our clients, we frequently hear them dismiss code review as an unnecessary extra. However, that perception couldn’t be further from the truth. Code review, a process in which software code is inspected for vulnerabilities before, during and after its implementation, is a necessary part of any cybersecurity strategy, especially if your company is about to implement a new program.   Although code writers are often brilliant scientists and artists, they may not be security specialists, …