Author: Web Admin

Robocalls – Are they Legal?

IN THE NEWS – ELIJAH Digest | April 18, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. A Robocall is an automated telephone call which delivers a recorded message (as if from a robot), typically on behalf of a political party or telemarketing company. In 2017, 5% of all cell phone calls were robocalls. In 2018 the number rose to 30%. In 2019, the number is expected to rise to 50% and have a major impact on data and cybersecurity. So, are these legal? The short answer is yes. The Federal Telephone Consumer Protection Act of 1991 allows for the non-commercial robocalls to most residential telephone lines. After receiving more than 215,000 consumer complaints in 2014 alone, the U.S. Federal Communications Commission (FCC) strengthened and clarified its regulations protecting consumers from unwanted robocalls and spam emails and texts. The Commission issued a package of declaratory rulings in June 2015 that… Read more »

What Are The 3 Key Things You Should Be Doing For Your Company’s Cybersecurity?

IN THE NEWS – ELIJAH Digest | April 04, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. From a one person business to a 10,000+ person business, Cybersecurity applies to companies of all sizes. Not only do all businesses need it, but most businesses need to improve it. Cyber criminals and hackers are getting more creative and aggressive every day, and the average cybersecurity team is struggling to keep ahead. So, what should you do today? Plan All businesses need to develop a plan for a potential cyber-attack. But what works for one business may not work for the next business. One size does not fit all. There are several guidelines that need to be considered before creating a plan. You also need to understand the business, how it works, and where your critical business operations fit into it. Do you need to protect customer data? Or your data? Do… Read more »

Elijah’s Own Jon Isenberg Recognized

Jon Isenberg, Elijah Information Technology’s President, was recently recognized and featured by the Birmingham Bloomfield Chamber of Commerce as their Ambassador of the Week. Jon was honored with the recognition for the final week of March, 2019. You can read more on the LinkedIn page of the Birmingham Bloomfield Chamber at

Make Cybersecurity Your 2019 New Year’s Resolution

IN THE NEWS – ELIJAH Digest | January 24, 2019 With the arrival of 2019, comes new motivations and resolutions. For 2019, the one thing every computer user should focus on is Data and Cybersecurity. After a long, busy year full of hacks, breaches, and ransomware infections, 2018 ended with an avalanche of fresh cybersecurity news. Weather Channel, for instance, was accused of having its mobile app track user location information for illicit reasons. Also making headlines was Marriott International – having acknowledged that its monumental 2018 breach, which exposed the reservation records of nearly 400 million users, included the loss of 5 million unencrypted passport numbers. Other nefarious schemes continue to proliferate. Hackers have recently started targeting Microsoft Office users through a phishing scheme that pretends to be an Office 365 non-delivery message. A prompt appears asking users to click “Send Again” before leading to a website that appears… Read more »

ELIJAH Recognized As Leading Data Security Adviser

IN THE NEWS – Elijah Digest – May 2018 We are excited to announce that ELIJAH was recognized as “Leading Data Security Adviser of the Year” in both Florida and Illinois by the 2018 AI Leading Adviser Awards. In addition to traditional cybersecurity services such as penetration testing and incident response, ELIJAH has developed two specialized offerings specifically geared to the legal community: (1) law firm managed cybersecurity services, designed to help small to mid-sized law firms safeguard client confidences and firm data; and (2) M&A cybersecurity due diligence, to augment legal teams’ efforts to evaluate the cybersecurity and IT posture of a potential acquisition. With company leadership comprised of data security experts who are former law firm partners, and a team of cybersecurity experts with decades of experience assisting law firms with meeting cybersecurity and digital forensic challenges, ELIJAH is uniquely positioned to help law firms meet their data… Read more »

ELIJAH Recognized for Multiple 2017 Awards

ELIJAH, a leading provider of computer forensics and cybersecurity expert services, received multiple year-end recognitions for outstanding expert services. CV Magazine’s Corporate Excellence Awards named ELIJAH as 2017’s “Digital Forensics Experts of the Year – USA”, and the 2017 AI Legal Awards recognized ELIJAH as “Best for Digital Forensics & Expert Testimony – Midwest USA”. Additionally, the 2017 AI Legal Awards recognized ELIJAH CEO Andy Reisman individually as the “information Systems Forensics Expert of the Year – USA”. “ELIJAH has assembled a world-class team of computer forensic experts and cyber security gurus, and have the pleasure of seeing what a great job they do for our clients every day,” said ELIJAH CEO Andy Reisman. “Being singled out as Information Systems Forensic Expert of the Year is a tremendous honor, but I strongly believe in a flat organizational structure that facilitates our team delivering efficient, collaborative solutions to clients with unmatched… Read more »


Grand Rapids, Michigan (August 4, 2017) – ELIJAH Ltd., a firm specializing in computer forensics and digital forensics investigations, becomes a proud corporate sponsor of NPR’s Grand Rapids affiliate, WGVU. About ELIJAH. Founded in 2003, ELIJAH is an industry leader in providing expert digital forensic and legal technology solutions to Grand Rapids and Michigan law firms and corporations. Recent industry recognitions for ELIJAH have included “Digital Forensics Provider of the Year” by the 2017 Finance Monthly Law Awards, “US Computer Investigations Provider of the Year” by the 2017 ACQ5 Law Awards, “Technology Solutions Provider of the Year (Legal) – USA” by the 2017 Lawyer International Global Awards, and “Best for Computer Forensics & Expert Testimony Services – USA” by the 2016 AI Legal Awards. For additional information, please visit or call 866-354-5240.

Self-Authenticating Evidence And Proposed Amendments to Federal Evidence Rule 902

Self-Authenticating Evidence

IN THE NEWS – ELIJAH Digest – August 2017 Effective December 1, 2017, amended Rule 902 of the Federal Rules of Evidence is expected to go into effect. The amended rule makes clear that assuming compliance with notice requirements, two new categories of evidence will be considered self-authenticating: (a) records “generated by an electronic process or system that produces an accurate result, as shown by a certification of a qualified person”; and (b) data “copied from an electronic device, storage medium, or file, if authenticated by a process of digital identification, as shown by a certification of a qualified person”. These amendments will create a strong incentive to perform forensically sound collections using qualified computer forensic experts, while ultimately reducing the likelihood of needing to spend resources to have such an expert testify at trial merely to authenticate evidence. Although using a skilled forensic expert to perform data collections could… Read more »

ELIJAH Digest – June 2017

LATEST HEADLINES Reality Winner, N.S.A. Contractor Accused of Leak, Was Undone by Trail of Clues – The New York Times WASHINGTON — In the months after President Trump was elected, Reality Leigh Winner frequently expressed outraged political views about him on social media, in between photos of her cats and favorite quotations. But on the afternoon of May 9, she posted an unusually anodyne message on Facebook, noting that she would be teaching two yoga classes that evening… Read More Forensic Computer Reviews and Emails as Documentary Evidence – New York Law Journal Forensic reviews of an opposing party’s computer to obtain electronically stored information (ESI) have been recently addressed in a number of state court decisions. The request is sometimes initially denied, as courts first want to see if the requesting party can obtain the sought after ESI from another source, as formed part of the rationale for the… Read more »