California Consumer Privacy Act (CCPA) – “America’s GDPR”

Do you do business in California or process the data of California residents? Does your business collect or track personal information regarding California residents on your website via the use of cookies or other marketing analytics?  Do you have a privacy or consent notice on your website? What exactly does “personal information” really mean under [...]November 12, 2019 | Greg Michalek

Proposed NC Cybersecurity Law HB 904

On April 17, 2019, a bipartisan group of North Carolina state representatives introduced a bill that would revamp existing law and require North Carolina businesses to take proactive steps to protect North Carolina residents’ personal information from data breaches.  The proposed bill, HB 904, would apply to all businesses in North Carolina and, in addition [...]May 16, 2019 | Greg Michalek

Gamification of Document Review

Fortnite, Division, Rainbow Six, Overwatch, Super Mario Odyssey – video games have become more pervasive than reality TV for many people in the last few years.  ‘Water-cooler chat’ tends to be about new levels in video games rather than who got a rose or who got kicked off the island. With this cultural past time change, [...]April 12, 2019 | Caragh Landry

International Women’s Day 2019

In the future, there will be no female leaders. There will just be leaders. – Sheryl Sandberg Happy International Women’s Day! This year’s theme is #BalanceforBetter and is focusing on ‘Think Equal, Build Smart, Innovate for Change.’ Today, events all over the world will celebrate the accomplishments women have made while also acknowledging the work [...]March 8, 2019 | April Marty

The Anatomy of Business Email Compromise (BEC)

Business email compromise (BEC) is an effective cyberattack that uses deception and impersonation to steal large sums of money from organizations. If an organization relies on wire transfers to make or receive payments then, sooner or later, it will be targeted. Furthermore, successful BEC attacks are financially devastating with losses regularly exceeding $100,000. Though there […]

January 16, 2019 |

Employee Spotlight: Eric Vanderburg

Meet the Team Employee Spotlight: Eric Vanderburg Title: Vice President, Cybersecurity Location: Cleveland, OH What is the most rewarding part of the job? I love the satisfaction of a job well done, and we get the chance to work on many interesting projects.  Clients come with unique scenarios, and we put together an innovative cybersecurity [...]January 3, 2019 |

Employee Spotlight: Nancy Cipriani

Meet the Team Employee Spotlight: Nancy Cipriani Title: Senior Project Director Location: Greensboro, NC Nancy Cipriani is a self-described Midwestern girl. Born and raised in Missouri, she graduated from the University of Central Missouri with a degree in Business Administration. It was after college, while working at a local law firm, that Nancy made an impression […]

December 5, 2018 |

Cyber Monday and Cybersecurity: Best Practices to Keep Data Safe

It’s that time of year again. The weather is getting colder, Starbucks has changed from pumpkin to peppermint and Christmas decorations are lining the stores (it’s only November, but that’s an argument for another day). As people are recovering from Thanksgiving, many are expected to shop online this Cyber Monday. Cyber Monday is one of [...]November 26, 2018 | Eric Vanderburg

Employee Spotlight: Joe Anguilano

Meet the Team Employee Spotlight: Joe Anguilano Title: Managing Director of Cybersecurity Location: Cleveland, OH How did you start at the company? In 2005, I was hired by JURINNOV (acquired by TCDI in 2016) as an intern during my senior year at John Carroll University. Upon graduation, I was brought on full-time as a Business Analyst. One [...]November 12, 2018 |

Top 10 Cybersecurity Tips for Organizations

"There are risks and costs to a program of action - but they are far less than the long range cost of comfortable inaction." - John F. Kennedy 1. Have a written incident response plan and practice it on a regular basis. Time is of the essence when responding to a data breach. Every second [...]August 23, 2018 | Tim Opsitnick

Request Info

TCDI | Computer Forensics | Cybersecurity | Litigation Technology