Computer Forensics: What is metadata?

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

What is metadata and why is it important in a computer forensics investigation? A brief definition or explanation of metadata is “data about data.” What does that exactly mean? Data is the file. Data is the Word document, the Excel document, or any other user-created document on the computer. Meta is information about that document. This can include where it’s …

Chief Cassandra Deck-Brown of the Raleigh Police Department to Retire

Protus3 News

Protus3 has a long history of partnerships with law enforcement agencies, but the Raleigh Police Department holds a special place in our collective heart. Many of our current and former employees got their start at RPD. We would like to take this time to recognize Chief Cassandra Deck-Brown of the Raleigh Police Department in honor of Black History Month. You …

county records

What is a “nationwide criminal search”?

Tasha Dyson, CFE Background Investigation

We’re asked all the time if we offer a “nationwide criminal search” or a “multi-state criminal search”. The answer is always “No.” Why not? Because it just doesn’t exist. Let’s talk about courts and criminal records in the US. No national database exists Currently, there is no comprehensive national database for all the criminal records in the US. Yes, the …

Two-Factor Authentication

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

What is two-factor authentication? Two-factor authentication is a second level of authentication for you the user to be able to access your account. The first level of authentication is your user ID and password. What that means is that anybody with your user ID and password can log into your web-based accounts whether it’s your email account, Office 365, your …

investigation

What kind of background investigation do I need?

Tasha Dyson, CFE Background Investigation

  We conduct a wide variety of background investigations for a lot of different reasons. Sometimes we’re conducting due diligence on companies who want to do business together. Other times it’s a threat assessment as part of an employment termination. Sometimes we’re conducting a background investigation in support of a larger investigation, like fraud or employee misconduct. Our most common …

two different panels

Why should we have security standards?

Dana Frentz, CHPA, PSP Security Planning, Security System Design Development, Security System Lifespan Management

Have you ever seen a situation where there seems no rhyme or reason for the placement of security devices? Wouldn’t it be wonderful to be able to hand your architect, engineer, or integrator a document and know that they have the specifics of what product you want and how you expect those products to be installed and function? Well, you …

angry man

Workplace Violence: What is a Threat Assessment?

Tasha Dyson, CFE Workplace Violence, WPV Support, WPV Threat Assessment

What is a threat assessment? One of the things clients frequently ask us has to do with workplace violence. Usually it goes something like this. We get a call from a company. They’re going to fire someone fairly soon, and they’re not sure how he’s going to react. They’re contacting us to see what sort of support we can provide. …

video security device

Seeing Security

Eric Martindale, CPP, CPD Security Schematic Design

This post was prompted by an initial project meeting and an annual tradition of watching a favorite movie around Christmas. During an initial project meeting, right after introductions, the Architect made a request. The Architect stated that the Client wanted all security devices to be invisible. In a previous conversation, I heard some examples of the measures to conceal devices. …

A Year and a Day Podcast

Protecting Your Electronic Devices and Data during a Divorce

Protus3 Computer Forensics

People often have questions about how to best protect their children and their assets during a divorce, but one area that they often overlook is protecting their data and making sure that their spouse can’t access their devices accidentally or otherwise. In this episode host Jaime Davis of Gailor Hunt explores this topic with Rusty Gilmore, a Security Consultant and …

A Delicate Balance, part 2 – Law Enforcement

Chuck Hurst News

During “normal” times the police generally control the masses because the masses allow that control. Or to put it another way, the public allows law enforcement to do their jobs. Thus the delicate balance and fragile trust relationship is born. These are not normal times! Just consider that within the framework of racial strife, societal unrest, police misconduct, political polarization …