social media

Home » social media

Best Practices for Preserving Social Media Evidence

In our earlier post on this topic, Best Practices for Searching Social Media for Evidence, we described a universal approach for searching the internet to locate and identify social media evidence.  In this article we discuss the best practices for preserving the evidence found, the rules of evidence that apply and steps that can be taken to overcome anticipated admissibility issues. Read the full article> See our Digital Evidence Toolbox for additional tools    

2018-06-11T12:57:03+00:00June 11th, 2018|Categories: Investigations, Social Media|Tags: , , , , , |Comments Off on Best Practices for Preserving Social Media Evidence

IRIS LLC Hosts Training for the CT Division of Public Defender Services

Thank you to everyone from the Connecticut Division of Public Defender Services who attended our latest digital forensics training seminar in Hartford, CT on Thursday, April 5, 2018.  It was a great opportunity to share our vision of promoting a universal standard for managing cell phone forensic extraction reports and preserving social media evidence in accordance with the best practices and industry standards. Harness the power of knowledge - Free guide and other investigative resources available in our Digital Evidence Toolbox: http://www.irisinvestigations.com/wordpress/iris-digital-evidence-toolbox/

2018-04-17T16:03:35+00:00April 16th, 2018|Categories: Cell Phone Forensics, Social Media, Training|Tags: , , |Comments Off on IRIS LLC Hosts Training for the CT Division of Public Defender Services

The Best Data Security and Identity Theft Prevention Methods for 2018

Be proactive and know what the crooks need to rip you off.  Identify vulnerable points and take measures to protect yourself against identity theft.  An ounce of prevention is worth a pound of cure.  You lock your door, why not your mail box?  But why stop there? What about your email box and all the devices and vulnerable points in-between. Read Full Article>

Hackers sought a $23,000 ransom after freezing a N.C. county’s website. They’re not getting it.

“3 things you can do to prevent a ransomware attack” 1.  Never open any attachment from ANY e-mail unless you are 100% sure it is legitimate and from a source that you trust (there are examples where an e-mail may come from someone you trust but that does not mean that they don’t have the virus and the attacker is using their PC to spread the malicious code). PLEASE always ensure the attachment is NOT a ZIP, EXE or other executable code.  There are some instances where a .doc is followed by a .zip (BE CAREFUL).  There are very common ones which are from USPS, UPS, FedEx, Etc… all stating to have your package tracking information. 2.  Don’t search websites or visit links that you are not familiar with. We have seen where clients have clicked on a picture in Facebook and received a virus. 3.  VERY IMPORTANT. Always make sure you have a good backup of your server and data. This is however not the magic answer because if your server gets hit with Ransomware it may also encrypt your backup drive thus rendering it useless.  The SOLUTION to this issue is to always ensure that you have a backup drive that you take off-site for the recovery of your data. You are the only one who can ensure that if you are hit with Ransomware that you have the proper backup off-site and that the backup is current.  We hope you never have to deal with Ransomware, but if you are prepared the damage can be very minimal without paying the requested ransom. Have questions or need help, our team at I.R.I.S. LLC consists of experienced, computer forensic IT experts that can assist [...]

2018-04-17T12:40:45+00:00December 11th, 2017|Categories: Computer Forensics, Investigations|Tags: , , , |Comments Off on Hackers sought a $23,000 ransom after freezing a N.C. county’s website. They’re not getting it.

Best Practices for Searching Social Media for Evidence

“While it’s sometimes easy to find a person’s social media page by their name, finding a page which a user has created under a different name or alias - making sure you have the correct page as well as assuring that you have captured all the data in accordance with the best practices can be a challenging task.” The approach involves a two step process of first conducting the searches and second preserving the evidence using a forensic approach that captures all the data.  The purpose of this article is to provide a consistent, comprehensive approach for searching the internet while following the best practices and ethical standards. See Full Article: Best Practices for Searching Social Media for Evidence

2018-04-17T12:44:16+00:00December 5th, 2017|Categories: Computer Forensics, Investigations|Tags: , , |Comments Off on Best Practices for Searching Social Media for Evidence