FBI logo

FBI Tech Tuesday: Building a Digital Defense Against Travel Scams

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Mobile Forensics, News, Security Program Development, Training

The FBI is tasked with investigating many categories of crimes including travel scams. As a result, they receive many tips that can be beneficial to the public when passed along. I can say with experience that the FBI has increased the process of alerting and educating the public about certain security and safety issues. This is most evident as it …

Is the Answer on a Mobile Device?

Russell W. Gilmore, CISSP, CISM, EnCE Electronic Data Recovery, Mobile Forensics

Quite often, yes. Clients have been complaining that John, a sales representative at your company, hasn’t been showing up to scheduled appointments for months, and you noticed his area sales have been rapidly declining. However, John has been submitting reports for all the expenses he’s incurred while traveling. You decided to fire John due to the discrepancies in his reports, …

cyber attack seminar

Cyber Attack Seminar

Protus3 Computer Forensics, Crisis Management Planning, Electronic Data Recovery, News, Training

Nearly half of U.S. businesses today have fallen victim to a cyberattack, with small and mid-sized firms most often the target. Unsure how to protect your business from data breach and cybercrime? Sentinel’s panel of cybersecurity experts is here to help. Sentinel Risk Advisors is hosting a luncheon and seminar on Tuesday, February 28. Panel experts will tell you how …

circuitboard with keys

Is Your Customer Data Your Greatest Asset or Your Greatest Liability (or Both)?

Protus3 Compliance, Computer Forensics, Corporate Compliance, Electronic Data Recovery, Intellectual Property

This article was originally published by Matthew A. Cordell at Ward and Smith, P.A. Customer data can be a treasure trove for an organization. Many businesses believe customer and prospect data to be their most valuable asset. Unfortunately, some have discovered that, unless handled with care, it can also be their greatest liability. Organizations of all kinds collect, store, analyze, …

Ransomware – All Hope is Not Lost

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, News

Recently Protus3 was asked to assist someone who had fallen prey to ransomware. The person had clicked on an attachment in an email, and it wasn’t too long before the message, shown here, popped up on their screen that all of the files in their My Documents folder had been encrypted. Remembering a recent news article about some ransomware encryption …

locked computer

Data Security: Where There Is Data, There Should Be Policy

Russell W. Gilmore, CISSP, CISM, EnCE Business Continuity Planning, Compliance, Computer Forensics, Corporate Compliance, Crisis Management Planning, Electronic Data Recovery, Security Policy and Procedure Development, Security Program Development

The recent report by the Wall Street Journal about the Morgan Stanley breach scares me as an employee. Reportedly Galen Marsh, a financial adviser for Morgan Stanley, was fired for allegedly stealing account information from about 350,000 wealth management clients and posting some of it online. The part that concerns me are the reports that federal law enforcement officials are …

the cloud

Security Suggestions – The Cloud and Your Data

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Intellectual Property

I am often asked to discuss IT and data security as it relates to storing data on the Cloud. Nine out of ten times I am asked two inevitable questions: “What is the Cloud?” and “Where is the Cloud?”. Hopefully I will answer these questions as I discuss ways to keep your data secure on the Cloud. There are a …

InfraGard logo

NC companies’ secrets at risk, cyber terrorism experts say

Protus3 Computer Forensics, Electronic Data Recovery, Fraud, News, Theft

In this day and age, sometimes it is difficult to discern truth from fiction. Greg Baker is an expert in the area of cyber terrorism and a leader in developing public/private relationships that work. In the later years of his career with the FBI, he was the face of InfraGard North Carolina. InfraGard is an information sharing and analysis effort …

people texting

Legal Requirements as Mobile Devices Inundate Offices

Protus3 Business Continuity Planning, Compliance, Computer Forensics, Corporate Compliance, Crisis Management Planning, Electronic Data Recovery, Intellectual Property, Security Planning, Security Policy and Procedure Development, Security Program Development, Technical Surveillance Countermeasures

By Elizabeth Johnson Originally published in Business North Carolina’s Law Journal, May 2012 issue With 87% of employees confirming they use personal electronic devices for work, designing a workable “bring-your-own-device” program is probably overdue. BYOD is a tricky issue; 48% of companies claim they would never authorize employees to use personal devices for work, but 57% acknowledge that employees do …