digital forensics

Is the Answer on a Mobile Device?

Russell W. Gilmore, CISSP, CISM, EnCEElectronic Data Recovery, Mobile Forensics

Quite often, yes. Clients have been complaining that John, your sales representative, hasn’t been showing up to scheduled appointments for months. You have also noticed that his area sales have been rapidly declining. However, John has been submitting reports for all the expenses he’s incurred while traveling. You decided to fire John due to the discrepancies in his reports. Now …

digital forensics expert

Five Computer Forensics Myths Debunked

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics

The media has presented a picture of computer forensics and the collection of data from a mobile device as a glamorous, fast process only used in high profile cases such as murder, espionage, and corruption. This is not the case. Let’s address a few common myths about computer forensics. Myth 1: Computer forensics is only used in high-profile cases or …

Ransomware – All Hope is Not Lost

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Electronic Data Recovery, News

Recently Protus3 was asked to assist someone who had fallen prey to ransomware. The person had clicked on an attachment in an email. It wasn’t too long before the message, shown here, popped up on their screen that the ransomware had encrypted all of the files in their My Documents folder. Remembering a recent news article about the identification of …

phone keypad

Are VoIP Phones Secure?

Russell W. Gilmore, CISSP, CISM, EnCENews

A recent article identified and discussed a security flaw in VoIP phones. I am not advocating throwing away your VoIP phone system and going back to analog; I recommend educating yourself to the possible threat, measuring the likelihood of that threat in your environment, and making corrective measures if necessary. Most of the electronic devices we use on a daily …

locked computer

Data Security: Where There Is Data, There Should Be Policy

Russell W. Gilmore, CISSP, CISM, EnCECompliance, Computer Forensics, Crisis Management Planning, Electronic Data Recovery, Security Program Development

The recent report by the Wall Street Journal about the Morgan Stanley data security breach scares me as an employee. Reportedly, Morgan Stanley terminated Galen Marsh, a financial adviser, for allegedly stealing account information from about 350,000 wealth management clients and posting some of it online. Federal law enforcement officials are focusing their probe on the possibility that Marsh’s computer …

the cloud

Security Suggestions – The Cloud and Your Data

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Electronic Data Recovery, Intellectual Property

I am often asked to discuss IT and data security as it relates to storing data on the Cloud. Nine out of ten times I am asked two inevitable questions: “What is the Cloud?” and “Where is the Cloud?”. Hopefully I will answer these questions as I discuss ways to keep your data secure on the Cloud. There are a …

power shift button

Held Hostage by a Dishonest Employee

Russell W. Gilmore, CISSP, CISM, EnCECompliance, Computer Forensics, Security Program Development, Theft, Embezzlement, and Fraud

I recently was involved in a case in which a company employee was discovered using a company credit card for personal reasons. This happens occasionally, and one would think that immediately terminating the dishonest employee would resolve the issue. But what happens when the employee is the one and only IT person for the company? Many companies have only one person …

pink slip

Terminating an Employee and Company Data

Russell W. Gilmore, CISSP, CISM, EnCECompliance, Computer Forensics, Theft, Embezzlement, and Fraud

Having to terminate an employee is never easy. To make the process even more difficult, consider the recent survey conducted by Harris Interactive on behalf of Courion which stated that 19% of employees age 18 to 34 would take company data with them if they knew they were about to be fired. Read the full story here. Depending on the …

apple bmw

Security Threat – Consider the Extremes

Russell W. Gilmore, CISSP, CISM, EnCECrisis Management Planning, Security Assessment, Security Program Development, Theft, Embezzlement, and Fraud

When we assess the security of our customers, employees, facilities and products, we usually look at the obvious problems. Depending on the environment, we expect what is considered the “normal” security threat. In a retail store environment, we may consider security measures that will keep the customers and employees safe, such as taking measures to keep someone from getting hurt …

iPhone and iPad

Apple Unique ID Numbers

Russell W. Gilmore, CISSP, CISM, EnCETheft, Embezzlement, and Fraud

Hackers have posted online the unique ID numbers for more than one million Apple devices. As claimed in news reports, the file was obtained through phishing. A hacker intercepted an email sent to several dozen FBI agents. In the header of the email were all of the agents’ email addresses. The hacker crafted emails that appeared to come from legitimate …