phishing scams

Phishing Scams and SMShishing Scams

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics

In today’s technology-based world, phishing email scams have become commonplace. Whether simple or complex these scams are often effective. Both companies and individuals fall victim to phishing scams leading to the loss of billions of dollars annually. Phishing scams typically involves a cybercriminal impersonating a legitimate company or individual. They attempt to gain access to personal or private information such …

See Something, Say Something Really Works

Tasha Dyson, CFE Training

10 Times See Something, Say Something Saved Lives in 2019 Source: Campus Safety Magazine, www.campussafetymagazine.com We’ve all heard the recommendation: See Something, Say Something. Does it really work? Absolutely. Campus Safety Magazine reported the ten examples below. Each provides an example of how advanced reporting helped to avert a potential incident. So we’ll say it again: See Something, Say Something. …

Technical Assessments - Standards

Technical Assessments – Standards

Dana Frentz, CHPA, PSP Security Assessment, Security Master Planning, Security Survey, Security System Lifespan Management

Our first post reviewed enclosure conditions and installation practices found in technical assessments.  We then discussed the importance of the appropriate installation and conditions of field devices. In this third installment, we are going to discuss one of the best ways to avoid the conditions previously discussed. It’s also how to begin cleaning up the messes that you do find. …

spectrum of workplace violence

Workplace Violence – What You Permit, You Promote

Christine L. Peterson, CPP, ISP Workplace Violence, WPV Support, WPV Threat Assessment, WPV Training

Why are we so surprised by workplace violence when we are willing to accept these unacceptable behaviors from our leaders? Is it possible that the key underlying issue is much bigger than the sum of all of these things? Let’s consider the effects of the internet, social media, 24-hour news, and other factors. For instance, there are wide-spread examples of …

Field Devices

Technical Assessments – Field Devices

Dana Frentz, CHPA, PSP Security Assessment, Security Survey, Security System Lifespan Management

In this second installment, we will be looking at field devices. This information comes from practices we have found when conducting a technical assessment. Multiple hardware components make up a security system. The term “head-end” equipment often refers to the server-based computers, client monitoring stations, and security panels. The “head-end” hardware devices communicate with the “field devices” of a particular …

Digital Delinquency: How to Respond to Employee Data Theft, Cyberbullying, and More

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Intellectual Property, Mobile Forensics, Theft, Embezzlement, and Fraud

Employers today are armed with more technology than ever before—with state-of-the art tools that improve productivity, enhance communication, and ultimately help to boost our bottom lines. But the more we rely on digital tools to create, store, and share data, the more vulnerable we become to employee digital data theft. Similarly, digital methods of communication can often open the door …

Technical Assessments – Installation and Maintenance Issues

Dana Frentz, CHPA, PSP Security Assessment, Security Survey, Security System Lifespan Management

This is the first of three blogs concerning the installation and maintenance practices we have found when conducting technical assessments. There are three principal parts of an integrated security plan: people, processes, and technology. As a result, each of these components serves to augment the effectiveness of the other. Looking at technology, there are dozens of electronic security management systems …

dark web login article

Stolen Login Credentials on the Dark Web

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics

Just because the company you work for is not a Fortune 500 company does not mean your credentials were not stolen at some point. According to an article in Security Magazine, 21 million login credentials stolen from Fortune 500 companies were found on the Dark Web. Bleepingcomputer.com reported that only 4.9 million of the passwords were unique. Just imagine what …

You’ve Conducted a Background Check… Now What?

Protus3 Background Investigation

Hiring new employees is a vital component of any successful business. Every company collects some type of background information. From the initial application to the final interview, employers seek to obtain information in order to assess several qualities about a potential hire. Are they competent? Do they have the right skills? Who is the best person for the position? Running …