Not everyone can be an expert in all subjects, nor should you expect to be. Capsicum has a team of consultants with a wide range of expertise and experience that covers all legal and technology areas. So you can concentrate on what you do best.
Does Capsicum offer project management services and what is included?
Yes. We can manage your project to the degree you desire—from overseeing the entire project to a support role. We will be with you from beginning to end, plus we’ll follow-up later to ensure that things continue to stay on track.
What type of consulting work does Capsicum provide?
Capsicum consults in digital forensics and investigations, paper and electronic discovery otherwise known as “eDiscovery,” data and tape recovery, cyber security, and related technology infrastructure.
How does Capsicum handle customer support?
We pride ourselves on providing the best customer support in the industry. Our reputation depends upon responding quickly and accurately to resolve your issues. Our aim is to always exceed expectations.
How do I request a price quote for my project
Our sales group can provide you with a customized, no-obligation quote for your project.
How is Capsicum Group qualified to help me?
Capsicum consultants have a wide range of academic and professional certifications in their various disciplines. Such as the following:
CISSP (Certified Information Systems Professional)
What risks are there if I don’t consult a computer forensics expert at the start of an event?
If computer forensics experts aren’t immediately called in, you could risk spoiling the evidence. The consequences of this could, at best, bring unneeded doubt into your case and, at worst, lose the case for you.
If I think evidence exists, is it okay for my technology expert to take a look before I get in touch with you?
No. We strongly advise you not to tamper with the data. This is of vital importance to the outcome of your case. While your IT expert might know quite a bit about technology, most likely he or she does not know the computer-forensic process. Any interaction with data in a non-forensically sound manner could result in changing the integrity of the data. Do not take the risk of allowing internal IT personnel to begin an investigation.
What makes a collection procedure forensically sound?
A forensic collection doesn’t change the source files, such that all original data and metadata are maintained. Our collections are accompanied by strict chain of custody records as well as reports documenting our forensic process.
I think that a computer in my organization may contain important evidence that needs to be collected. What do I do now?
If this computer is off, leave it off. If the computer is on, contact Capsicum and we can guide you through the next steps.
What is the process of a typical digital forensic examination?
While there is no one particular type of forensic examination, Capsicum has standard best practice procedures we will follow to initiate the process. First, we would conduct initial interviews to discuss and get an understanding of the scope and nature of the case. In doing so, we would then be able to tailor an appropriate response. At this time, we would list potential sources of evidence and begin collecting evidence in a forensically sound manner. Once the evidence is securely in Capsicum’s care, we can begin analyzing it.
What is the difference between computer forensics and electronic discovery?
Both processes start with the collection and preservation of digital data. Electronic discovery typically involves a large quantity of documents, which are reviewed for substance, categorized and then produced. Computer forensics utilizes an expert who will conduct an investigation, search and then analyze evidence, and then report on it.
When should I consider using computer forensics?
Computer forensics can be used to determine if and how a computer was used. This comes in handy whenever there is a question about a specific file, the movement of data, or an event that involves computers and digital information.
Can you recover my data?
Capsicum has recovered data from black boxes on sunken ships, video recorders, GPS devices, cars, computers, hard drives to complex worldwide storage systems, and much more.
Can data be recovered from messaging applications?
Data can be restored from certain messaging systems, but not all. If you are unsure how to proceed, contact Capsicum for no commitment review.
Can data collections be done remotely?
Capsicum has collected data remotely and in person from locations all around the world. Our approach varies depending upon the volume of data, available communication systems and privacy regulation of the location in which the data resides.
What is eDiscovery?
Electronic discovery or eDiscovery is the process in civil litigation of generating digitally stored documents and communications. The process of eDiscovery involves the identification, preservation, collection, processing, review and production of this electronic data.
What is metadata and why is it important in eDiscovery?
Metadata is information describing data. All files have metadata such as a file’s name, its creation date/time, or the sent date/time of an email. This is important because it adds clarity and context to an individual file.
What is the advantage of processing data electronically rather than in paper form for discovery purposes?
Massive amounts of paper can get disorganized quickly, but electronic processing and production of data allows for an organized and efficient review process. And, with the aid of computer efficiency, electronic data can also be tracked and reviewed securely.
What is an online eDiscovery review platform?
Capsicum is a Relativity Premium Hosting Partner, who is able to offer online hosting services to our clients. Relativity, a comprehensive, web-based tool, allows us to provide our clients with the following:
Early case assessment
Image and native file review
Extensive searching capabilities
Feature-rich and flexible interface
Unicode and foreign language support
What is the difference between producing a document natively or in a TIFF/Image format?
The main differences are as follows:
Native: This allows the reviewer to view the document in its original form. This can be both an advantage and disadvantage. Native files need to be opened and viewed through applications that can understand their format. This can allow for variations from reviewer to reviewer, which can cause confusion.
Tiff/Image: Tiffing is the process of printing a document and creating an image of the result. This allows the document to become “frozen” and thus standardizing what the reviewing parties see.
Why is it necessary for me to duplicate my documents?
A good reason to duplicate your documents is to avoid damage or loss of original documents. Our goal is to create a replica of the original documents.
What are Capsicum’s paper capabilities?
We assist our clients with a physical photocopy document in black and white, also available in color.
We have multiple paper sheets to choose from started with Letter Sheets (8.5 x 11 Paper), Legal Sheets (8.5 x 14 Paper), Ledger Sheets (11 x 17), & Customized Sheets upon request.
Tab dividers include: Standard Number Tabs 1-100, Standard Letter Tabs A-Z, Standard Bottom Number Tabs 1-100, Standard Bottom Letter Tabs A-Z, Exhibit Standard Number Tabs 1-100, Exhibit Bottom Number Tab 1-100, & Custom 1/5 cut tabs example (AAA-ZZZ).
Can paper productions be done on-site?
Capsicum offers paper productions both on-site and remotely.
We recognize that each client need is different (i.e dependent on industry and preference) and are willing to work to identify the best/most convenient solution for our clients.
Cyber, Data, Network Security & Compliance
What do I do if I think I’ve been hacked?
Do not shut the computer down. Remove the machine from the Internet by unplugging the network cable or turning off the wireless antenna. Refrain from any other activity on the device. Then, call Capsicum as soon as you can. We can advise you from there.
What are some ways to achieve a more secure password?
Modern password-cracking tools are quite good at obtaining credentials very quickly. Use a phrase, along with spaces, numbers and punctuation. Do not use words and phrases that are common knowledge. Pick something private and important to you, that is both easy to remember, but difficult to guess. Add some case variation. For example, "Fishing 4 trout, lake Mohawk." This password will take some time to type, but it is memorable and difficult to crack.
I am not a big target, why should I be concerned with security?
Gone are the days of lone hackers out to prove themselves. Today's intruders are highly sophisticated and well-financed operatives, often backed by organized crime. Using techniques, like spear-phishing and complex malware, they can quickly gain access to sensitive data. Even smaller organizations can be easily targeted. Vigilance is vital, as we’ve seen a disturbing rise in malware-related bank fraud in smaller businesses.
Is it possible to recover data from a hard drive that has been damaged?
Yes. However, each case is unique and requires an examination of the media itself to determine whether recovery is possible. Depending on whether the issue involves corrupt data or physical damage to the hard drive, as well as the severity of damage to the media in question, data recovery is possible. At Capsicum, we can conduct a free assessment to determine the appropriate steps for data recovery.
What is considered a reportable event?
A reportable event is an adverse event or incident that has the potential to be classified by the IRB as an unanticipated problem posing risks to participants or others. In general, an incident is determined to be a reportable event when it is both:
probably or definitely related to participation in the research, AND
unexpected in terms of nature, severity, or frequency
Is blockchain able to be hacked?
Yes, blockchain technology can be hacked. At one pointed heralded as unhackable, the advances in technology and improved techniques by hackers have rendered blockchain no longer a bulletproof solution.
What can I do in order to prevent being hacked?
Some easy steps you can take in prevention are:
Changing your password frequently, creating password phrases or sentences with variations (uppercase, lower case, spaces, special characters, etc.)
Make sure to your software patches are up to date
Use dual factor authentication whenever possible
Don’t open emails in which you don’t recognize the senders email address
I just found a USB lying around outside my office, is it okay to insert into my computer?
No! You are not aware of the contents of the USB and as such should not plug it into any machine which contains important information or has access to your network. Believe it or not some individuals are leaving compromised USBs in public locations hoping that someone will pick them up and insert the device into their computer.
By Your Side, Ready to Begin, Let’s Start the Conversation.