dark web login article

Stolen Login Credentials on the Dark Web

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Mobile Forensics

Just because the company you work for is not a Fortune 500 company does not mean your credentials were not stolen at some point. According to an article in Security Magazine, 21 million login credentials stolen from Fortune 500 companies were found on the Dark Web. Bleepingcomputer.com reported that only 4.9 million of the passwords were unique. Just imagine what …

data erased

Employee Deception: Too Little, Too Late

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Electronic Data Recovery, Theft, Embezzlement, and Fraud

Protus3 conducts a wide variety of corporate investigations related to employee deception. Some of the more common issues involve harassment complaints or theft of data. Sometimes these issues appear while the employee is still with the company. In other cases, the employee deception does not come to light for weeks or months after they have left the company. Even when …

laptop with lock on it

Two-Factor Authentication: A Resolution That Works

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Electronic Data Recovery, Mobile Forensics, Security Program Development, Theft, Embezzlement, and Fraud

Many people ring in the New Year with celebrations and hopes of a better year. The New Year symbolizes the ending of one year and the beginning of another even better year. Some offer advice to bring happiness and prosperity to others: Eat twelve grapes at midnight or eat black-eyed peas on January 1. My advice is more concrete and …

FBI logo

FBI Tech Tuesday: Building a Digital Defense Against Travel Scams

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Electronic Data Recovery, Mobile Forensics, News, Security Program Development, Training

The FBI investigates many categories of crimes including travel scams. As a result, they receive many tips that can be beneficial to the public when passed along. I am glad that the FBI has increased the process of alerting and educating the public about certain security issues. This is most evident as it relates to internet and computer security. Most …

infosecurity article 2018-08

PGA Hack

Russell W. Gilmore, CISSP, CISM, EnCEMobile Forensics, News, Security Program Development

It appears the PGA was hacked and fell victim to a ransomware attack. According to some reports, attackers used BitPaymer Ransomware. As a result, attackers can hack into remote desktop services connected to the internet. If I have said it once I have said it a hundred times: Do not allow Remote Desktop Services to connect into your network from …

Security Magazine article

Why Employees are Your Greatest Cyber Risk

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Mobile Forensics, News, Theft, Embezzlement, and Fraud, Training

A company will do everything it can to protect its network and data. They hire information security experts and purchase security software and hardware to protect from outside intrusions. They do a number of things to reduce their cyber risk. Most are missing the largest risk to their data – the employee. A recent study finds that nearly two in …

TBJ article

Millions Evaporate as Trade Secrets Lawsuits Fly Across NC, US

Russell W. Gilmore, CISSP, CISM, EnCEMobile Forensics, News, Theft, Embezzlement, and Fraud

The July 6, 2018, issue of the Triangle Business Journal included an article entitled “Millions evaporate as trade secrets lawsuits fly across NC, US”. This article provided good information about the increase in the theft of company-owned data. We have also seen an increase of data theft investigations at Protus3. We work side-by-side with law firms to provide evidence of …

bring your own device

Benefits and Disadvantages of BYOD

Russell W. Gilmore, CISSP, CISM, EnCESecurity Program Development

What is BYOD? BYOD is an acronym for “Bring Your Own Device.” It refers to the practice of employees using a personal device for work. With BYOD, a single individual has the capacity to affect himself, those close to him, the company, and potentially millions of other people. One unsecured device can harm millions of individuals and organizations who may …

Question Mark Key on Computer Keyboard

Electronically Stored Information – More than Just Domestic Cases

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics

Question Mark Key on Computer Keyboard[/caption]>I receive calls from attorneys and clients on a daily basis. Some I have worked for in the past and some got my name from a colleague. In most cases, there is an issue involving electronic data, computers, mobile devices or the internet. Anytime electronically stored information becomes part of a civil or criminal matter, …