Quantcast
Channel: TCDI Blog - Cybersecurity, eDiscovery, Managed Document Review
Browsing all 36 articles
Browse latest View live

Data Privacy Day 2021

Privacy. Some may view it as an out dated philosophy – something that is no longer possible in a world of social media and interconnected lives. Something that is sometimes sacrificed in the name of...

View Article



Image may be NSFW.
Clik here to view.

Ransomware Attacks: How to Defend Against This Growing Threat

Download the Incident Response Investigation Fact Sheet It’s no secret that ransomware attacks continue to grow each year and can be devastating for small and mid-sized businesses. One simple security...

View Article

More Than Just Technology – The Importance of People and Process in Remote...

Since Covid 19 has hit, security around Remote Review has been a major topic of discussion.  Mostly, this discussion has centered around the technology we are able to employ to secure our clients’...

View Article

Image may be NSFW.
Clik here to view.

2020 Legal Technology and Practices Survey Results

Next year will mark the 20th anniversary of TCDI’s CVLynx platform, as we know it and love it today. What originated as a thick client case management tool in the 1990s, quickly grew into a combined...

View Article

Image may be NSFW.
Clik here to view.

Gamification of Document Review

Fortnite, Division, Rainbow Six, Overwatch, Super Mario Odyssey – video games have become more pervasive than reality TV for many people in the last few years.  ‘Water-cooler chat’ tends to be about...

View Article


Image may be NSFW.
Clik here to view.

Why your Business Needs a Digital Forensics & Incident Response (DFIR) Partner.

During the aftermath of a breach or other security incident, things can be chaotic.  The last thing you want to be doing in the heat of an incident is searching for a Digital Forensics & Incident...

View Article

Image may be NSFW.
Clik here to view.

Colonial Pipeline: Ransomware or Nation-State Attack? How to Defend your...

This blog will provide cybersecurity commentary on the recent Colonial Pipeline Ransomware incident, and what key takeaways all businesses should implement to protect themselves from...

View Article

Driving Growth and Continued Evolution with Chris Attucks

Chris Attucks was recently promoted to Chief Technology Officer. This role was strategically created as the logical path forward for TCDI, as we continue to grow and keep our clients on the leading...

View Article


Image may be NSFW.
Clik here to view.

Steve Wujek on eDiscovery Security

Q: TCDI hosts eDiscovery data in its own data center.  How does this benefit our clients?  Tech Freaks + Futuristic Tech = Nimble eDiscovery Software Steve: First and foremost, TCDI’s data centers are...

View Article


Image may be NSFW.
Clik here to view.

Preparing for CMMC: How to Manage Your Digital Supply Chain Risk

Webinars Home / Blog Play Video Where do you want to jump to? Preparing for CMMC – 1:40Digital Supply Chain Security – 13:22Third-Party Risk Management – 29:00Q&A with the Panelists – 39:52 Don't...

View Article

What is an Incident Response Plan (IRP), and Why are they so Important?

Interview with Eric Vanderburg - Vice President, Cybersecurity How to Write an Effective Cyber Incident Response Plan First Name* Last Name* Company* Email* Direct Phone**EmailThis field is for...

View Article

Image may be NSFW.
Clik here to view.

What to Do When You’ve Been Hacked: Grab Your IRP

Interview with Eric Vanderburg - Vice President, Cybersecurity How to Write an Effective Cyber Incident Response Plan First Name* Last Name* Company* Email* Direct Phone**PhoneThis field is for...

View Article

What Should I Include in my Incident Response Plan?

Interview with Eric Vanderburg - Vice President, Cybersecurity How to Write an Effective Cyber Incident Response Plan First Name* Last Name* Company* Email* Direct Phone**NameThis field is for...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Landscape in 2021: The Year of the Data Breach

What You'll Learn in this Article Data Breaches in the News Supply Chain Attacks Ransomware Small-to-Mid-Sized Businesses (SMBs) Threats Facing SMBs Best Practices to Protect Against Supply Chain...

View Article

Image may be NSFW.
Clik here to view.

2020 Legal Technology and Practices Survey Results

Next year will mark the 20th anniversary of TCDI’s CVLynx platform, as we know it and love it today. What originated as a thick client case management tool in the 1990s, quickly grew into a combined...

View Article


Developer Corner: How pgx creates PostgreSQL extension SQL definitions that...

PostgreSQL offers an extension interface, and it’s my belief that Rust is a fantastic language to write extensions for it. Eric Ridge thought so too, and started pgx awhile back. I’ve been working with...

View Article

Image may be NSFW.
Clik here to view.

Ransomware? Expert Incident Response (DFIR) team. 24/7 Hotline.

Has your business been hit by ransomware? TCDI’s expert Digital Forensics and Incident Response (DFIR) team is ready at a moment’s notice to help you get back to business quickly.  It's important to...

View Article


Top 10 Cybersecurity Tips for SMBs: How to Develop Your Cybersecurity Strategy

Top 10 Cybersecurity Tips Click on the cybersecurity tips below to jump to the section you would like to learn more about.Conduct a Cybersecurity AssessmentPerform Penetration TestingActively Monitor...

View Article

Image may be NSFW.
Clik here to view.

The Unfolding Cyberwar and How it May Impact your Business

Cyberwar Impact on Businesses: Ransomware & Wiper Malware Spillover Concerned You May Have Been Hit with Ransomware, Wiper Malware, or a DDoS attack? Start Your Investigation Now First Name* Last...

View Article

Image may be NSFW.
Clik here to view.

Web Application Penetration Test: Securing You Web Application Against Cyber...

Web Application Penetration Test Click on the web application penetration testing methodology components below to jump to the section you would like to learn more about. Web Application Penetration...

View Article
Browsing all 36 articles
Browse latest View live


Latest Images