secure network

Secure Your Network

Russell W. Gilmore, CISSP, CISM, EnCE Computer Security

As technology becomes more intertwined with our daily lives, the “bad guys” will continue to find vulnerabilities and gain access to private accounts and data. Because of this, it is important to secure your network and data. A best practice is to implement multiple security measures to minimize potential threats. Antivirus programs, virtual private networks (VPNs), and complex passwords are …

ThreatPost article

Leaked Data and Targeted Attacks

Russell W. Gilmore, CISSP, CISM, EnCE Computer Security

How can leaked data cause a targeted attack? Have you ever wondered why you got a suspicious email from a bank where you have an account? How about the emails about needing to change a password for a service? Let’s not forget the calls to your cell about your power being cut off or your computer being hacked. The information …

bring your own device

Security Concerns for Personal Devices in the Workplace (BYOD)

Russell W. Gilmore, CISSP, CISM, EnCE Security Planning, Security Policy and Procedure Development, Uncategorized

We first addressed personal devices in the workplace back in 2018. That seems like such a long time ago now. With record numbers of employees now working from home due to COVID, how should we think about personal devices in the workplace? What are some of the security concerns that you should address? When work occurs on personal devices, how …

two different panels

Why should you have security standards?

Dana Frentz, CHPA, PSP Security Planning, Security System Design Development, Security System Lifespan Management

Although this article was written for the International Association of Healthcare Safety and Security (IAHSS), these concepts apply to almost any organization. To put it simply, if you have security technology, you should have security standards. If you’re a member of IAHSS, you can access the entire original article here. Have you ever seen a situation where there seems no …

coronavirus COVID-19

Workplace Violence and Coronavirus Disease – 2021

Megan Keenan News, Workplace Violence

“We’re beginning to realize that coronavirus disease, COVID-19, will be an event burned into our minds and hearts for generations.” This was written by Chris Peterson, former President of Protus3, in March 2020. Little did we know then just how much COVID-19 would affect us and change who we are. “Most of our workforce today has nothing by which to …

Technology in My Divorce

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics

The standard issues involved with a divorce or separation are most often very difficult. In the past decade I have seen these difficult situations made even more difficult because of technology. Text messages, emails, smartphones, and other technology are relevant in many of the cases we see. As computer forensics consultants, we are asked to check computers for keylogging software …

safety and security

What’s the difference between safety and security?

Protus3 Security Assessment

I am Megan Keenan, the Business Development Manager here at Protus3. One of the first things I learned after I joined the team was the difference between safety and security. A lot of times, these two words are used interchangeably. People say safety when they really mean security. Both safety and security are concerned with keeping people from harm and …

potential executive

Executive Level Background Investigations

Tasha Dyson, CFE Background Investigation

Let’s say you’re about to hire a new CFO. He’s been a CFO, comptroller, and vice president in the last 10 years at three different companies. All the right skills and qualifications are listed on his resume. He’s had several interviews, and he’s fantastic. He’s had the right answer to every question you’ve asked. You’ve heard nothing but good things …

criminal record

Background Investigations: Reading between the Lines

Tasha Dyson, CFE Background Investigation

Recently, we were working on a pre-employment background investigation where the scope of work was limited to a criminal search. When we looked at the criminal history of the applicant, we saw the image on the right. What do you see? The subject has charges and convictions for identity theft and drugs, but what else? I see a pretty decent …

Computer Forensics: What is metadata?

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

What is metadata and why is it important in a computer forensics investigation? A brief definition or explanation of metadata is “data about data.” What does that exactly mean? Data is the file. Data is the Word document, the Excel document, or any other user-created document on the computer. Meta is information about that document. This can include where it’s …