3 Ways to Make Your Resume Stand OutÂ
Hiring teams can look at hundreds of resumes a day, and glance at each one for 6-7 seconds. How can you take your resume to the next level, and gain the attention of these teams? Here are three sim...
Recipe for Creating a Successful Information Governance Program
Creating a successful information governance (IG) program requires a solid foundation and a clear understanding of what IG entails. Building a strong foundation for your IG program involves several...
Lessons Learned for 2023: Spotlighting Five Key eDiscovery Trends from 2022
By: Philip Favro, Presa Consulting With the New Year upon us, it is worth looking back at some of the top eDiscovery cases and trends from 2022 and exploring the lessons they offer going forward in...
CPRA & VCDPA – Are You Ready?
How to Stay Compliant with the New CPRA and VCDPA Privacy Data Laws Data in America is currently regulated through a patchwork of laws. At the state level, there are privacy data laws and breach no...
The Impact that the Changing Nature of Documents is Having on eDiscovery
By: Philip Favro, Presa Consulting Abstract Notions about what constitutes a “document” have significantly changed over the years, leading to increasing complexity for government agencies and regul...
4 Ways to Implement Privacy as a Service: You Don’t Have to Do It Alone
By: Naheed Bleecker, Director of Cybersecurity and Governance Did you know you can operationalize your privacy policies without extra training, staff, or headaches? The onslaught of privacy regulat...
Ephemeral Messaging – Understanding Key Preservation Issues in Civil Litigation
By: Philip Favro, Presa Consulting Consider the following scenario. You are presiding over a business litigation dispute where a representative for one of the parties regularly communicates by text...
Top 5 Litigation Roadblocks in M365
When talking with our customers about discovery, specifically Microsoft Office 365 (M365), it becomes apparent that the rush to M365 during the pandemic introduced new speed bumps and roadblocks in...
New Sanctions Case Offers Lessons on ESI Protocols and Information Governance Policies
By: Philip Favro, Presa Consulting Philip Favro, Consultant, Information Governance & eDiscovery, Innovative Driven ESI protocols have become an increasingly contentious issue in eDiscovery. While ...
Navigating Social Media Discovery: Steps Counsel Can Take to Address Mass Deletion of Social Media History
By: Philip Favro, Presa Consulting Philip Favro, Consultant, Information Governance & eDiscovery, Innovative Driven Helen Adams, U.S. Magistrate Judge, Southern District of Iowa Leslie Behaunek, Li...
How to remediate a rushed M365 Implementation Post Pandemic
During the unprecedented global pandemic that hit the world in early 2020, companies had to almost immediately shift from office-based work to remote work environments. During this time, most compa...
New Cases Spotlight eDiscovery Trends on Possession, Custody or Control and Jury Instructions re ESI Spoliation
Phillip Favro, Consultant, Information Governance & eDiscovery New eDiscovery cases continue to proliferate, spotlighting key trends regarding the handling of ESI in litigation. Two particularly no...
Privacy Beyond Regulatory Compliance
Three trends apply pressure to today’s privacy programs: Increased consumer awareness Regulatory landscape becoming more complex Data & technology landscape is evolving Increased customer awarene...
Solving the Privilege Conundrum
by Philip Favro, IG & eDiscovery Consultant, Innovative Driven, with Practical Law Litigation This document is published by Practical Law and can be found at: us.practicallaw.tr.com/W-001-3978 Requ...
Privacy Happenings – April 2022
In Case You Missed It: This Month’s Privacy Topics Sanity: Implement a Privacy Framework For privacy professionals attempting to implement privacy and data security programs, it’s a tumultuou...
How to Build a Sound Data Security Plan: 5 Key Principles
By Linda Coniglio, Director of Privacy and Information Governance Most organizations keep sensitive personal data such as names, Social Security numbers, credit card, or other account data in unstr...
Why Moving Email Archives to The Cloud is ImportantÂ
Many businesses are considering moving to the Cloud for a variety of reasons. It might be for business resilience, better collaboration through SharePoint or Microsoft Teams, the ever-growing secur...
Privacy Compliance Newsletter – March
Automating the Data Map: A Bare Necessity! Although the words “Data Map†do not specifically appear in privacy regulations, a Data Map operationalizes the requirement of keeping a record of pro...
Court Sanctions Plaintiff for Destroying Relevant Facebook Messenger and Telegram Messages
Phillip Favro, Consultant, Information Governance & eDiscovery The Honorable David Campbell, who led the Federal Civil Rules Advisory Committee that developed the Rule 37(e) amendments enacted in 2...
CLE Recap: 2021 eDiscovery Case Law
eDiscovery case law in the U.S. continues to proliferate and evolve, offering any number of lessons to clients and counsel on how to address and handle ESI during litigation. On January 26, 2022, P...
Spoliation of Evidence: Definition, Threats, and How to Avoid It
Michael D’Angelo, Senior Forensics Consultant, Innovative Driven When a lawsuit is filed, the attorney should prove that the at-fault party acted negligently. The proof depends on many pieces of ev...
An Introduction to Data Cleanup
By: Linda Coniglio, Information Governance and Privacy Specialist, CIPP/US There is a term that’s used to describe the large, hard-to-manage volumes of data – both structured and unstructured â...
Court Rejects Sanctions Based on Party’s Efforts to Remediate Data Loss
Phillip Favro, Consultant, Information Governance & eDiscovery Litigation readiness for organizations generally begins with basic ESI preservation steps including litigation holds, relevant source ...
February 2022 Privacy Newsletter
Spotlight: How to Implement and Maintain a Privacy Compliance Program We live in the era of Big Data and, according to estimates, the volume of business data worldwide, across all companies, double...
How To Implement and Maintain a Privacy Compliance Program – an introduction
By: Linda Coniglio, Information Governance and Privacy Specialist, CIPP/US When British mathematician Clive Humby coined the quote “Data is the New Oil†back in 2006, he surely couldn’t have ...
Be a Data Privacy Champion
By Linda Coniglio, Director, Privacy and Information Governance Data Privacy Week aims to inspire dialogue and empower individuals and companies to take action. Data Privacy Week is an internationa...
Innovative Driven Announces Commitment to Respecting Data by Becoming a 2022 Data Privacy Week Champion
This year’s initiative emphasizes educating businesses on data collection best practices that respect data privacy and promoting transparency. Falls Church, VA & Arlington, VA (January 24, 2022) ...
Privacy Headlines – 2021 in Review
Data Breaches Data breaches frequently made the headlines throughout 2021. Phishing and ransomware proved to be the two most popular tools for bad actors. Fines and number of affected individuals w...
Understanding the Importance of a Structured Data Agreement in eDiscovery
By: Ken Baldesi, Vice President, Client Services A structured data agreement is a type of contract that formalizes the relationship between the parties involved in an eDiscovery process. It has thr...
Lessons Learned for 2022: Spotlighting Five eDiscovery Trends from 2021
By: Philip Favro, Consultant, IG and eDiscovery With the New Year upon us, it is worth looking back at some of the top eDiscovery cases and trends from 2021 and exploring the lessons they offer goi...
The Complete Guide to Understanding the eDiscovery Process
By: Ken Baldesi, Vice President, Client Services Blame it on the internet: email and other communication technologies make it too easy to create and store digital information. The problem is that t...
Five Reasons You Can’t Ignore Your ROT and Dark Data
By Linda Coniglio, Director, Privacy and Information Governance Every day employees throughout an organization create, save, share, and store data to do their jobs – and A LOT of it. This data i...
Info Gov 101: What is Information Governance & Why it is Critical for Your Organization?
Linda Coniglio, Director of Privacy & Information Governance Information governance (IG) is a framework for managing data by establishing policies & procedures for how information is created, store...
What Litigants Should Know About New Court Decisions on Categorical Privilege Logs
By: Philip Favro, Consultant, IG and eDiscovery Parties are turning to privilege log alternatives like metadata logs, categorical logs, and logs reflecting samples of privileged documents to ame...
December Privacy Happenings
The Newest Business Disrupter It’s undeniable – we are plugged in. Digital devices permeate nearly every facet of our lives, and the digital universe continues to expand. As these devices bec...
Driven and Innovative Discovery Merge to Better Serve Clients Along the Information Lifecycle
Falls Church, VA & Arlington, VA (November 10, 2021) — Driven, Inc. (“Drivenâ€) and Innovative Discovery, LLC (“IDâ€) announced today that the two companies have merged, creating an end-to-en...
Data Governance Is the First Line of Cyber Defense
By: Nate Latessa, VP of Corporate Services Since 2003, October has been recognized as National Cyber Security Awareness month. It’s a collaboration between the US Department of Homeland Security ...
Design Thinking for Automation: Five Steps to Organizational Benefits
By Scott Burt, VP of Corporate Strategies The principles of design thinking are perfectly poised to solve business problems because its tenants involve more collaboration around specific issues use...
Accelerate Your Business Performance with IBM Cloud Pak for Automation
By Scott Burt, VP of Corporate Strategies Business cycles can be hampered by many things like innovative disruption, regulatory changes, and competitive forces. The constant need for technology inn...
The Intersection of Information Governance and Privacy Compliance
Linda Coniglio, Director of Privacy & Information Governance Information governance is a framework for managing data by establishing policies and procedures for how information is created, stored, ...
Modernization Workshops
Ready to integrate modern approaches into your content strategy? ID’s modernization workshops offer insights into best practices, industry trends, cycles, and innovations to help your...
Capture Content Data With Ease Using IBM’s Automation Document Processing
By: Scott Burt, VP of Corporate Strategies Capture Content Data with Ease Using IBM’s Automation Document Processing The IBM Automation Document Processing (ADP) system is a new solution that com...
What’s Lurking in the Shadows of Dark Patterns?
By: Linda Coniglio, Information Governance and Privacy Specialist It’s that time of year when pumpkin sales soar, horror movies are plentiful, and everyone plans to dress as some spooky character f...
It’s Not Just Your Data Anymore
By: Linda Coniglio, Information Governance and Privacy Specialist In the last two years, there have been over 100 privacy and cyber security laws enacted globally. In the US alone, each of the 50 ...
The Most Dangerous Threat to Your Business May Be Your Coworker
By: Nate Latessa, Vice President of Corporate Services Intellectual property theft results mostly from insider threats or employees who feel entitled to information, which they maliciously sell to ...
U.S. Bill Aims to Punish Firms and Individuals for American IP Theft
Linda Coniglio, Director of Privacy & Information Governance The U.S. is one of the wealthiest countries in the world and the greatest producer of intellectual property according to the National Cr...
A Customer Journey to Cloud and Container Platforms
Many organizations are moving to cloud and are using this solution to modernize their Java applications. And IBM has a new suite of products to reflect the technology shift. “All new IBM technology...
Innovative Discovery Introduces AnalyzID, an Intellectual Property Theft Detection Tool
[Arlington, VA, August 5, 2021] – Innovative Discovery (ID), data experts serving law firms, corporations, and government agencies through the information lifecycle, is proud to announce the l...
Innovative Discovery Becomes a OneTrust Certified Partner
[Arlington, VA, August 2, 2021] – Innovative Discovery (ID), data experts serving law firms, corporations, and government agencies through the information lifecycle, is pleased to announce i...
Cyber Talent Crunch vs Privacy Risk
By: Linda Coniglio, Director of Privacy and Information Governance “Hackers gain access . . .†seems to be the lead story of many news outlets the past few months. These stories describe crimi...
Trends Shaping the Future of eDiscovery
By: Ken Baldesi, Vice President, Client Services 2020 caused numerous changes in the legal and information governance industries. Legal professionals had no choice but to adapt to the new norm to c...
IT Spending Flexibility with IBM’s Cloud Pak for Content Automation
The name of the game with IBM’s Cloud Pak for Automation is flexibility – flexibility in your deployment options and flexibility in your licensing choices. “The benefit of this flexibility wi...
Operational Resilience Through Workflow Automation
by: Scott Burt, VP of Corporate Strategies In a recent webinar about IBM’s Cloud Pak for Workflow Automation, industry experts referred to the post-pandemic business landscape as the “new norma...
Innovative Discovery Introduces: Platform Modernization Workshops
[Arlington, VA, July 16, 2021] – Innovative Discovery (ID), data experts serving law firms, corporations, and government agencies through the information lifecycle, is pleased to announce the lau...
IBM Announces Move Toward Hyper-Automation with AI-Embedded Cloud Paks
by: Scott Burt, Vice President of Corporate Strategies What Are Cloud Platforms and Containers? Cloud and container platforms — like IBM Cloud Paks — represent the future of automation in a fu...
What Happened on LinkedIn?
By: Nate Latessa, VP of Corporate Services This blog was written for ACEDS and can also be found on their blog. On June 22, 2021, a hacker announced the sale of over 700,000 pieces of personal info...
Focus Your Retention Blur
By: Linda Coniglio, Director of Privacy and Information Governance For a long time, companies have focused more on the risk of losing data than on retaining too much data. In fact, “The Badge of...
What Kind of Review is Right for You?
Executing a managed review may seem like a straightforward task, but there are often overlooked details that leave cost and time savings on the table. ID knows the questions to ask to identify thes...
Volkswagen learns an expensive lesson on the dangers of ROT
By: Nate Latessa, VP of Corporate Services Volkswagen and Audi are the latest victims of a data breach that exposed the contact info on 3.3 million customers, including phone numbers, email address...
So You Think Privacy Compliance is Costly?
By: Linda Coniglio, Director of Privacy and Information Governance The privacy and compliance arena is quite active these days and, according to Gartner, will continue to be in the near future. Ga...
Process FOIA Requests More Efficiently
By James Perkins, Chief Client Officer Processing a Freedom of Information Act request is a complex and time-consuming task. Federal agencies struggle to keep up with the workload, and the lack of ...
Reasons Why You Should Clean Up Your File Shares
Linda Coniglio, Director of Privacy & Information Governance & Rachel Desormes, Information Governance Consultant Fact: Unstructured data grows by 55-65% each year (Marr, 2019). Fact: 69% of the in...
Will 2021 be the year that we get a federal consumer privacy law?
By: Linda Coniglio, Director of Privacy and Information Governance On March 10, Suzan DelBene (D-WA-01) introduced the Information Transparency and Personal Data Control Act which creates a natio...
What the Pipeline Didn’t Prepare For: Your Data Gives You Control
Nate Latessa, VP of Corporate Services Ransomware attacks increased by 485% in 2020 compared to 2019 and they do not appear to be slowing down anytime soon. This week’s attack on the Colonial Pi...
Privacy Regulations Popping Up Like Spring Flowers
By: Linda Coniglio, Director of Privacy and Information Governance California and Virginia have passed comprehensive privacy regulations. The California law has been amended. More than 10 othe...
The Benefits of Government Agencies Moving to the Cloud
By: James Perkins, Chief Client Officer Nearly 10 years ago, the U.S. government launched the Federal Risk and Authorization Management Program (FedRAMP) to promote and standardize the adoption of ...
The first 24 hours: data breach checklist
By: Nate Latessa, Vice President of Corporate Services Every 11 seconds this year, a business will experience a ransomware attack, according to a projection by Cybersecurity Ventures. Back in 2016,...
In a galaxy far, far away, active learning saved the day.
By: Wayland Radin and Andrew Erland May the force be with you Inquiring minds on the ID team wanted to determine, once and for all, where certain Star Wars icons fell on the light vs. dark spectrum...
Virginia is Set to Become the 2nd U.S. State to Pass a Data Privacy Regulation
By: Nate Latessa, VP, Corporate Services | Innovative Discovery The Virginia Consumer Data Protection Act (VCDPA) has passed both the House and Senate and awaits reconciliation which is believed to...
Innovative Discovery to Continue Leadership in Finding Treatments and Cures for Blindness
By: Scott Burt, VP, Corporate Strategies | Innovative Discovery PHOTO: L to R, Max Sundstrom, Steve Sundstrom, David Brint, Scott Burt. Max and Steve are members of Birdie Boys team which has play...
TAR 1.0 vs TAR 2.0
By: Wayland Radin, Director of Operations, Analytics | Innovative Discovery Leverage Machine Learning to Handle Expanding Volume Exponentially expanding data volumes present one of the most signifi...
Data Privacy Day Jan 28th, 2021
By: Linda Coniglio, Director of Data Privacy and Information Governance | Innovative Discovery Fact: 68% of business leaders feel their cybersecurity risks are increasing. It goes without saying, t...
Fully Destroying Data Is Harder Than It Looks
By: Nate Latessa, Vice President of Corporate Services Up until a few years ago, there were very few incentives to destroy or delete data. Storage is cheap; it’s difficult or impossible to get info...
Data Mapping – What’s the Buzz?
By: Linda Coniglio Data mapping has been around for a long time. It was even identified as a best practice in the Federal Rules of Civil Procedure (FRCP). But everyone knows it’s the responsibili...
The Courage to Hit Delete
By: Justin Schierkolk, Marketing Manager Data or content management may not be something we give much thought to until it’s absolutely necessary. Often times, litigation or corporate policy upda...
What Keeps Your CEO Up at Night?
By: Linda Coniglio What keeps your CEO up at night? When running a company, there are so many different factors CEOs need to keep into account. If their employee turnover is too high, they need to ...
Trends and Tools for eDiscovery – a webinar recap
By: Savannah Aaron, Marketing Manager The world of legal technology and eDiscovery tools has always evolved at a fast pace. The emergence of the global pandemic earlier this year, however, transfor...
Innovative Discovery Named #1 Legal Process Outsourcing Provider in the New York Law Journal Best of 2020
[Arlington, VA, September 28, 2020] – Innovative Discovery (ID),a trusted partner for law firms, corporations, and government agencies throughout the information lifecycle, is proud to announce th...
What Is the Information Lifecycle?
by: Kim Taylor, CEO Here at Innovative Discovery, we say that we partner with law firms, corporations, and government agencies to provide service, guidance, and consultation throughout the informat...
Why the Right PM Team Makes All of the Difference
By: Ken Baldesi, VP, Client Services Taking on an eDiscovery project might sound a like a formidable task considering how many electronic records exist nowadays. The amount of evidence and other pe...
Your house knows you better than your significant other
By: Christopher Wooten, Senior Forensic Examiner In every relationship it takes time and moments together to create a bond. Once that bond is established, we begin to feel comfortable enough to sha...
Is Remote Work Increasing Data Hoarding?
By: Clint Modesitt, Manager of Digital Forensics Many companies have been forced to rapidly pivot to remote work, often with suboptimal preparation on the part of both employers and employees. From...
Innovative Discovery and Integro Merge to Create an Information Governance Powerhouse
[Arlington, VA, September 2, 2020] – Innovative Discovery (ID), a trusted partner for law firms, corporations, and government agencies that provides service, guidance, and consultation throughout...
The Ever-Changing World of Legal Technology
By: Bryan Campbell, Chief Operations Officer When it comes to innovative and cutting-edge technology in the legal field, the world changes very quickly. Law firms are having to move with the times ...
How to Stop File Corruption when Migrating Data
By: Nate Latessa, VP of Corporate Services Data corruption can severely disrupt business processes. In the worst case, it isn’t noticed for a long time, and a broken file is copied to multiple loca...
The COVID-19 Effect: Trends and Observations in eDiscovery
By: Kim Taylor, CEO eDiscovery trends typically develop gradually, following the pace of technological advancement, but the coronavirus pandemic has prompted a tidal wave of changes in a very short...
Bridging the Gap Between Legal and Technology Communication During Complex eDiscovery Matters
By: Andrew Dorsey, Senior Project Manager eDiscovery matters require expertise from both the legal and technical fields, two disciplines that can often speak different languages, leaving the potent...
What Does Google Know About You?
By: Chris VanAernam, Senior Forensic Consultant You may not realize it and it is especially true if you use an Android device, but Google is constantly collecting data about your actions and locati...
So, You Want to Control Litigation Spend? – Try the Combo of Analytics and Managed Review Services
By: Cathy Fetgatter, SVP, Analytics & Managed Review I recently chatted with two very dynamic and respected associate general counsels to dig into how law departments are using analytics and manage...
Data hoarding may be the biggest threat to your business
By: Nate Latessa, VP of Corporate Services The feeling of “I might need this later” leads some people to retain all their data forever. Storage is relatively cheap, so there’s a little personal inc...
When You Acquire a Business, Are You Acquiring a Data Breach Liability?
By: Kim Taylor, CEO The acquisition of a business involves many risks and uncertainties. The damage from past data breaches is potentially a huge risk. A Forbes article reports that 40% of companie...
Unlocking eDiscovery’s Hidden Compliance Powers
By: Nate Latessa, Vice President of Corporate Services In the two years since General Data Protection Regulation (GDPR) came into effect, over 100 privacy laws have been introduced around the glob...
Managing Mobile Collections and Other Non-Traditional Data Types
By: Clint Modesitt, Manager, Digital Forensics It’s an interesting time in digital forensics and eDiscovery, as rapidly evolving technology and communication tools play a growing role in litigation...
Early Signs of Malicious Users on Your Network
By: Jamie Neilon Network security is of utmost importance in the modern business world. Keeping your data and your resources secure is essential, and while you may have a great firewall and compreh...
Trending eDiscovery Apps
By: Bryan Campbell, COO From Wickr to TikTok, software apps with inadequate security and protocols have triggered headline-grabbing litigation and government investigations. Apps also have become a...
Remote Collections are Not the New Normal – They are the Standard
by: Nate Latessa, Vice President of Corporate Services To say that we’ve found ourselves in a drastically different world is an understatement. Just a month ago, most of us had never heard the ...
How to Get Your Team On-Board with Company-Wide Data Protection
By: Jamie Neilon You’re likely to benefit significantly from turning to security teams and vendors for data protection, but your employees also need to help by adhering to certain policies and enga...
Identifying and Combating Email Risks
By: Jamie Neilon Emails have become such a central part of our day-to-day lives, whether it is in a personal or professional atmosphere. Masses of people opt to send an email rather than having phy...
Responding to COVID-19: A Letter from Our CEO.
Valued friends, As the coronavirus (COVID-19) situation continues to evolve, our organization has been monitoring these fast-moving developments. The safety of our employees, customers, and commun...
Six Ways You Can Reduce Risk in a Transition to the Cloud
By: Bryan Campbell, Chief Operations Officer Moving data services to the cloud is a smart decision for many firms and organizations. It takes away most of the burden of IT management and puts full-...
Best Practices to Prevent a Data Breach
By: Jamie Neilon According to a recent study, 5,183 breaches occurred during the first nine months of 2019. These breaches exposed 7.9 billion records. That is a 33.3% increase in the number of...
Data maps are important, but what makes for a good one?
By: Nate Latessa In a previous blog post, I discussed the importance of having a data map to effectively protect sensitive information. During my research, I discovered that only 54% of companies ...
Five Things We Heard at Legaltech
by: Kim Taylor, CEO Legaltech New York 2020 has come and gone, and I am always grateful for the opportunity to mingle with industry peers, meet up with old friends, and make new ones. With such a w...
Winning the wi-fi game
Last year, during Super Bowl LIII, over 24 terabytes of data was transferred by more than 38K users within Mercedes-Benz stadium. That is a 47% increase from the year before; the equivalent of 28 mi...
You Can’t Protect Data You Can’t Find
By: Nate Latessa New and emerging privacy laws have ratcheted up the pressure on organizations to protect customer and employee data better. With corporate data volumes increasing by 62% every year...
a webinar: eDiscovery and Information Lifecycle Trends
2019 Year in Review and Predictions for 2020 As technology continues to advance, the sheer volume, variety, and complexity of data has increased at an exponential rate. With this surge of electroni...
How to prepare for emerging trends in eDiscovery and the Information Lifecycle
It’s a busy time for corporations and law firms monitoring eDiscovery and information lifecycle trends, and that’s sure to continue in 2020 and beyond. Innovative Discovery (ID) recently hosted a w...
Identifying Trade Secrets: a managed review case study.
The Situation A developer of pharmaceutical products contacted Innovative Discovery (ID) to help identify potential trade secret information on a former employee’s laptop in order to remediate th...
Don’t let the internet spoil a surprise.
January 9, 2020 Online shopping offers the perks of a larger selection of potential gifts, a way to quickly compare prices, and the time savings of making purchases from anywhere. And, with so many...
eDiscovery: 2019 trends in Review
Dec. 26, 2019 For the electronic discovery industry, 2019 was characterized by continued growth and demand for its ever-evolving technology, company mergers, new, challenging privacy laws; and a le...
Countdown to CCPA: How to Prepare 
December 19, 2019 The California Consumer Privacy Act (CCPA) – one of the most comprehensive data privacy laws in the United States – gives consumers more transparency and control over how th...
Leveraging Previously Reviewed Documents
The Situation The client needed to review 150,112 documents for responsiveness and privilege with limited resources available and a ten-day deadline. Due to the time constraint, the client could no...
How to avoid a “touchless hackâ€
December 12, 2019 Becoming a successful hacker might depend more on a person’s knowledge of psychology than on their expertise in information technology, according to cybersecurity experts. Either ...
Maintaining Network Security During the Holiday Shopping Season
December 2, 2019 No matter how many employees you have, it’s likely that some of them will be shopping during the Black Friday/Cyber Monday holiday. As sales start to creep up earlier every year, s...
Managing Remote Teams the “Taylor Way.”
November 13, 2019 Kim Taylor, longtime information technology and legal service executive, started out as a skeptic of remote work. Now, the chief executive officer of Innovative Discovery leads a ...
Don’t Miss the Remote Security Boat
November 7, 2019 Remote work provides many benefits to employees, employers, and the environment in the form of boosting worker productivity and efficiency, helping to attract and retain employees,...
How to Protect IP in Today’s Big Data World
October 30, 2019 Companies rely on big data and expert data engineering services to improve and develop their products and services as well as boost their profits. Big data does so much for many in...
ID Introduces Refreshed Brand Identity
Innovative Discovery is proud to announce a refresh of its brand image and a redesign of the company website. The new ID website serves as an educational resource for not only clients but for...
Innovative Discovery Announces Partnership with Brainspace, an Industry Leading Comprehensive Analytics Platform
[Arlington, VA, October 16, 2019] Innovative Discovery (ID), a trusted partner for law firms, corporations, and government agencies throughout the information lifecycle, is proud to announce a part...
Digital Assistants: Friend or Foe
Voice-activated digital assistants can seem like a dream come true for sole proprietors and small businesses. Found in smartphones and stand-alone smart speakers, they can perform tasks such as sch...
FedRAMP: the gold standard for CSP security
October 10, 2019 On retail websites, an SSL (secure sockets layer) certificate symbol signals to consumers that the credit card data they input will be encrypted during delivery to the retailer. Si...
The shocking way you are leaving your organization vulnerable to a data breach
October 4, 2019 Data breaches often conjure up images of crafty hackers weaving complicated codes to invade an organization’s network, with the possibility of releasing secure or confidential infor...
Are Analytics Right for You?
October 2, 2019 Clients often ask whether analytics, technology-assisted review (TAR), or an equivalent buzzword is a good fit for their matter or can assist in achieving a specific goal. The answe...