28 Years of Service
McCann Investigations works with clients to gather digital evidence in a vast array of cases and practice areas. These areas involve complex civil, family and criminal cases and encompass multiple investigation techniques to provide a comprehensive case solutions.
McCann Investigators have been helping clients for 28 years in both law enforcement and in the private arenas. McCann Investigations has evolved through the years embracing technology as a means to gather evidence in cases such as fraud, intellectual property theft, non compete enforcement, family law and complex civil and criminal cases. Because McCann Investigators have diverse backgrounds in both law enforcement and in the private sector, they understand the complexity of business and how their practice areas can best serve clients when they have issues.
McCann also works in incident response for clients in data breach and privacy loss cases. McCann Investigators not only help clients to discover, document and halt a data breach, they also help to put protocol in place to prevent future intrusions. The compromise of a company's sensitive data can not only cause financial loss, it can have a long standing negative effect on the company's reputation.
Related Posts from Our Blog
Recycled phones retain their previous owners’ data
Recycling cell phones is not new however, it is rapidly becoming very popular. Frankly, it makes sense economically. In fact, many vendors are offering a "trade-in" allowance when buying or upgrading a cell phone. Unfortunately, people are giving their phones to unknown entities for recycling without realizing that personal data can (and usually is) left behind, even after a mass deletion or a factory reset. The result of this is the potential for confidential information being exploited by criminals. Here are some things to consider before recycling your cell phone.
What do Sarah Palin, Ashton Kutcher, Beyonce, and George W. Bush have in common?
They’ve had their emails accounts hacked. And the list goes on even further - Scarlett Johansson, Paris Hilton, Christina Aguilera, Christina Hendricks. How do these celebrities get hacked so easily? The victims made it easy for the hackers to reset their email passwords by using simple challenge questions and publicly known answers.
This Week in Cyber Threats
Cyber threats, many state sponsored are becoming more prevalent as countries attempt to not only gain access to sensitive information, but to also to sabotage the networks. With US corporations and organizations being suspected targets for attempts of cyber attacks by China and Iran, you might not realize that antivirus software may not protect you.
The McCann Suite of Investigation Tools: