Philadelphia Technology Blog
Our Philadelphia technology blog is for busy business and legal executives in small to mid-sized companies. We share insights and information you can digest quickly and act upon.
Browse by Category
What is Data Recovery?
Data recovery is a process that involves retrieving inaccessible data from damaged or corrupted storage, files, or media. Data recovery is becoming increasingly important as people’s dependence on technology becomes more prevalent. Data recovery is an essential...
Is Digital Evidence Admissible in Court?
Admissibility of Digital Evidence in Court Is digital evidence admissible in court? Everyone is working and playing online now. This means that crimes that used to take place in the physical world are being committed electronically. Do you know where to find that...
Opening the Office under Covid 19 Concerns
Work from Home Technologies shine as Employee's Covid 19 and return to work concerns are real. The lack of information about Covid 19 and the rush to return to the office, even as Work from Home Technologies succeed, creates unnecessary anxiety. It’s discerning that...
Your Web Searches as Evidence in Criminal Cases – Your Data is Included
Web Searches as Evidence in Criminal Cases Google, your Collected Web Search Information and the Law Our digital forensics group was recently contacted by a defense attorney to review a digital forensic report submitted by law enforcement. The defendant was identified...
Mobile Cybersecurity and iCloud Hacks
The term “CYBERSECURITY” rips through media like a wildfire. From top-secret WikiLeaks to Jennifer Lawrence’s hacked iCloud, cybersecurity has become an important part of our daily lives. But what is cybersecurity? What exactly is protected? Where are we vulnerable?...
Forensic Focus – What’s Up with WhatsApp
Whatsapp Forensics Presents Special Challenges The smartphone app WhatsApp has become a major concern for forensic investigations. This app, owned by Facebook, is a cross-platform messaging app providing encrypted communications, Internet voice calls, unlimited...
The Password Dilemma
Password “security” – what value does it really have for you? That depends on how much you value your identity. In today’s society, the term is overused to the point of us becoming desensitized to the importance of keeping our passwords secure. We tend to ignore the...
Bringing a Collaborative Approach to Information Technology System Integration During Acquisitions
Successfully integrating systems from two distinct IT environments is one of the biggest challenges during a merger or acquisition. Often, this is too big of a project for IT organizations within the companies to assume with current staff and resources. According to...
My Top 3 Tech Predictions for 2018
Meet George Jetson It should be of no surprise that voice, drone, and machine learning technologies are maturing at an expeditious rate. Furthermore, the consumer desire to be further dependent on such devices is driving and fueling this technology growth. All this...
IT Acceleration Can Assist with All of Your IT Support Needs
Contact us to learn more about our help desk, managed IT services, and compliance services or just to get a quote.