Coronavirus & Remote Work Considerations

As the rapidly developing Coronavirus situation continues to unfold, many employees may soon be required to work from home to help minimize exposure.  There are important cybersecurity considerations when working remotely that, if ignored, place your entire organization at risk. Remote work can be done securely with the proper procedures, training, and technology in place. [...]March 17, 2020 | Eric Vanderburg

Coronavirus, Schmoronavirus (Covid-19, TCDI and MSMR & Remote Review)

Yesterday morning, my husband’s company directed all employees to work from home for the ‘foreseeable’ future. Last night my kids’ school, as well as schools from several surrounding towns, was shut down indefinitely due to students testing positive for the Coronavirus.  This morning a slumber party my daughter is attending this weekend was cancelled. And [...]March 12, 2020 | Caragh Landry

CCPA’s Far Reaching Impact on Third Parties

The California Consumer Privacy Act (CCPA) is now in effect, and its impact will be far-reaching. A cursory glance at the CCPA compliance might lead you to believe that it only impacts those who are working in California. After all, the Act was created to protect the privacy rights of California residents. However, our world [...]January 28, 2020 | Eric Vanderburg

Managed Doc Review vs Staffing

Managed Document Review (MDR) is often confused with attorney staffing, even after 15+ years as a commonly used service model.  At TCDI, we often get requests to place attorneys onsite at law firms across the US and we have to turn away these engagements because legal staffing is not something we offer at TCDI.  In [...]January 28, 2020 | Caragh Landry

California Consumer Privacy Act (CCPA) – “America’s GDPR”

Do you do business in California or process the data of California residents? Does your business collect or track personal information regarding California residents on your website via the use of cookies or other marketing analytics?  Do you have a privacy or consent notice on your website? What exactly does “personal information” really mean under [...]November 12, 2019 | Greg Michalek

Proposed NC Cybersecurity Law HB 904

On April 17, 2019, a bipartisan group of North Carolina state representatives introduced a bill that would revamp existing law and require North Carolina businesses to take proactive steps to protect North Carolina residents’ personal information from data breaches.  The proposed bill, HB 904, would apply to all businesses in North Carolina and, in addition [...]May 16, 2019 | Greg Michalek

Gamification of Document Review

Fortnite, Division, Rainbow Six, Overwatch, Super Mario Odyssey – video games have become more pervasive than reality TV for many people in the last few years.  ‘Water-cooler chat’ tends to be about new levels in video games rather than who got a rose or who got kicked off the island. With this cultural past time change, [...]April 12, 2019 | Caragh Landry

International Women’s Day 2019

In the future, there will be no female leaders. There will just be leaders. – Sheryl Sandberg Happy International Women’s Day! This year’s theme is #BalanceforBetter and is focusing on ‘Think Equal, Build Smart, Innovate for Change.’ Today, events all over the world will celebrate the accomplishments women have made while also acknowledging the work [...]March 8, 2019 |

The Anatomy of Business Email Compromise (BEC)

Business email compromise (BEC) is an effective cyberattack that uses deception and impersonation to steal large sums of money from organizations. If an organization relies on wire transfers to make or receive payments then, sooner or later, it will be targeted. Furthermore, successful BEC attacks are financially devastating with losses regularly exceeding $100,000. Though there […]

January 16, 2019 |

Employee Spotlight: Eric Vanderburg

Meet the Team Employee Spotlight: Eric Vanderburg Title: Vice President, Cybersecurity Location: Cleveland, OH What is the most rewarding part of the job? I love the satisfaction of a job well done, and we get the chance to work on many interesting projects.  Clients come with unique scenarios, and we put together an innovative cybersecurity [...]January 3, 2019 |

Request Info

TCDI | Computer Forensics | Cybersecurity | Litigation Technology