Data Privacy Day 2021
Privacy. Some may view it as an out dated philosophy – something that is no longer possible in a world of social media and interconnected lives. Something that is sometimes sacrificed in the name of...
View ArticleRansomware Attacks: How to Defend Against This Growing Threat
Download the Incident Response Investigation Fact Sheet It’s no secret that ransomware attacks continue to grow each year and can be devastating for small and mid-sized businesses. One simple security...
View ArticleMore Than Just Technology – The Importance of People and Process in Remote...
Since Covid 19 has hit, security around Remote Review has been a major topic of discussion. Mostly, this discussion has centered around the technology we are able to employ to secure our clients’...
View Article2020 Legal Technology and Practices Survey Results
Next year will mark the 20th anniversary of TCDI’s CVLynx platform, as we know it and love it today. What originated as a thick client case management tool in the 1990s, quickly grew into a combined...
View ArticleGamification of Document Review
Fortnite, Division, Rainbow Six, Overwatch, Super Mario Odyssey – video games have become more pervasive than reality TV for many people in the last few years. ‘Water-cooler chat’ tends to be about...
View ArticleWhy your Business Needs a Digital Forensics & Incident Response (DFIR) Partner.
During the aftermath of a breach or other security incident, things can be chaotic. The last thing you want to be doing in the heat of an incident is searching for a Digital Forensics & Incident...
View ArticleColonial Pipeline: Ransomware or Nation-State Attack? How to Defend your...
This blog will provide cybersecurity commentary on the recent Colonial Pipeline Ransomware incident, and what key takeaways all businesses should implement to protect themselves from...
View ArticleDriving Growth and Continued Evolution with Chris Attucks
Chris Attucks was recently promoted to Chief Technology Officer. This role was strategically created as the logical path forward for TCDI, as we continue to grow and keep our clients on the leading...
View ArticleSteve Wujek on eDiscovery Security
Q: TCDI hosts eDiscovery data in its own data center. How does this benefit our clients? Tech Freaks + Futuristic Tech = Nimble eDiscovery Software Steve: First and foremost, TCDI’s data centers are...
View ArticlePreparing for CMMC: How to Manage Your Digital Supply Chain Risk
Webinars Home / Blog Play Video Where do you want to jump to? Preparing for CMMC – 1:40Digital Supply Chain Security – 13:22Third-Party Risk Management – 29:00Q&A with the Panelists – 39:52 Don't...
View ArticleWhat is an Incident Response Plan (IRP), and Why are they so Important?
Interview with Eric Vanderburg - Vice President, Cybersecurity How to Write an Effective Cyber Incident Response Plan First Name* Last Name* Company* Email* Direct Phone**EmailThis field is for...
View ArticleWhat to Do When You’ve Been Hacked: Grab Your IRP
Interview with Eric Vanderburg - Vice President, Cybersecurity How to Write an Effective Cyber Incident Response Plan First Name* Last Name* Company* Email* Direct Phone**PhoneThis field is for...
View ArticleWhat Should I Include in my Incident Response Plan?
Interview with Eric Vanderburg - Vice President, Cybersecurity How to Write an Effective Cyber Incident Response Plan First Name* Last Name* Company* Email* Direct Phone**NameThis field is for...
View ArticleCybersecurity Landscape in 2021: The Year of the Data Breach
What You'll Learn in this Article Data Breaches in the News Supply Chain Attacks Ransomware Small-to-Mid-Sized Businesses (SMBs) Threats Facing SMBs Best Practices to Protect Against Supply Chain...
View Article2020 Legal Technology and Practices Survey Results
Next year will mark the 20th anniversary of TCDI’s CVLynx platform, as we know it and love it today. What originated as a thick client case management tool in the 1990s, quickly grew into a combined...
View ArticleDeveloper Corner: How pgx creates PostgreSQL extension SQL definitions that...
PostgreSQL offers an extension interface, and it’s my belief that Rust is a fantastic language to write extensions for it. Eric Ridge thought so too, and started pgx awhile back. I’ve been working with...
View ArticleRansomware? Expert Incident Response (DFIR) team. 24/7 Hotline.
Has your business been hit by ransomware? TCDI’s expert Digital Forensics and Incident Response (DFIR) team is ready at a moment’s notice to help you get back to business quickly. It's important to...
View ArticleTop 10 Cybersecurity Tips for SMBs: How to Develop Your Cybersecurity Strategy
Top 10 Cybersecurity Tips Click on the cybersecurity tips below to jump to the section you would like to learn more about.Conduct a Cybersecurity AssessmentPerform Penetration TestingActively Monitor...
View ArticleThe Unfolding Cyberwar and How it May Impact your Business
Cyberwar Impact on Businesses: Ransomware & Wiper Malware Spillover Concerned You May Have Been Hit with Ransomware, Wiper Malware, or a DDoS attack? Start Your Investigation Now First Name* Last...
View ArticleWeb Application Penetration Test: Securing You Web Application Against Cyber...
Web Application Penetration Test Click on the web application penetration testing methodology components below to jump to the section you would like to learn more about. Web Application Penetration...
View Article