data erased

Employee Deception: Too Little, Too Late

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Embezzlement, Fraud, Theft, Theft, Embezzlement, and Fraud, Uncategorized

Protus3 conducts a wide variety of corporate investigations related to employee deception. Some of the more common issues involve harassment complaints or theft of data. Sometimes these issues appear while the employee is still with the company. In other cases, the employee deception does not come to light for weeks or months after they have left the company. Even when …

laptop with lock on it

Two-Factor Authentication: A Resolution That Works

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Mobile Forensics, Security Policy and Procedure Development, Theft, Embezzlement, and Fraud

Many people ring in the New Year with celebrations and hopes of a better year. The New Year symbolizes the ending of one year and the beginning of another even better year. Some offer advice to bring happiness and prosperity to others: Eat twelve grapes at midnight or eat black-eyed peas on January 1. My advice is more concrete and …

FBI logo

FBI Tech Tuesday: Building a Digital Defense Against Travel Scams

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Mobile Forensics, News, Security Program Development, Training

The FBI investigates many categories of crimes including travel scams. As a result, they receive many tips that can be beneficial to the public when passed along. I am glad that the FBI has increased the process of alerting and educating the public about certain security issues. This is most evident as it relates to internet and computer security. Most …

Is the Answer on a Mobile Device?

Russell W. Gilmore, CISSP, CISM, EnCE Electronic Data Recovery, Mobile Forensics

Quite often, yes. Clients have been complaining that John, a sales representative at your company, hasn’t been showing up to scheduled appointments for months, and you noticed his area sales have been rapidly declining. However, John has been submitting reports for all the expenses he’s incurred while traveling. You decided to fire John due to the discrepancies in his reports, …

cyber attack seminar

Cyber Attack Seminar

Protus3 Computer Forensics, Crisis Management Planning, Electronic Data Recovery, News, Training

Nearly half of U.S. businesses today have fallen victim to a cyberattack, with small and mid-sized firms most often the target. Unsure how to protect your business from data breach and cybercrime? Sentinel’s panel of cybersecurity experts is here to help. Sentinel Risk Advisors is hosting a luncheon and seminar on Tuesday, February 28. Panel experts will tell you how …

circuitboard with keys

Is Your Customer Data Your Greatest Asset or Your Greatest Liability (or Both)?

Protus3 Compliance, Computer Forensics, Corporate Compliance, Electronic Data Recovery, Intellectual Property

This article was originally published by Matthew A. Cordell at Ward and Smith, P.A. Customer data can be a treasure trove for an organization. Many businesses believe customer and prospect data to be their most valuable asset. Unfortunately, some have discovered that, unless handled with care, it can also be their greatest liability. Organizations of all kinds collect, store, analyze, …

Ransomware – All Hope is Not Lost

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, News

Recently Protus3 was asked to assist someone who had fallen prey to ransomware. The person had clicked on an attachment in an email, and it wasn’t too long before the message, shown here, popped up on their screen that all of the files in their My Documents folder had been encrypted. Remembering a recent news article about some ransomware encryption …

locked computer

Data Security: Where There Is Data, There Should Be Policy

Russell W. Gilmore, CISSP, CISM, EnCE Business Continuity Planning, Compliance, Computer Forensics, Corporate Compliance, Crisis Management Planning, Electronic Data Recovery, Security Policy and Procedure Development, Security Program Development

The recent report by the Wall Street Journal about the Morgan Stanley breach scares me as an employee. Reportedly Galen Marsh, a financial adviser for Morgan Stanley, was fired for allegedly stealing account information from about 350,000 wealth management clients and posting some of it online. The part that concerns me are the reports that federal law enforcement officials are …

the cloud

Security Suggestions – The Cloud and Your Data

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Intellectual Property

I am often asked to discuss IT and data security as it relates to storing data on the Cloud. Nine out of ten times I am asked two inevitable questions: “What is the Cloud?” and “Where is the Cloud?”. Hopefully I will answer these questions as I discuss ways to keep your data secure on the Cloud. There are a …

InfraGard logo

NC companies’ secrets at risk, cyber terrorism experts say

Protus3 Computer Forensics, Electronic Data Recovery, Fraud, News, Theft

In this day and age, sometimes it is difficult to discern truth from fiction. Greg Baker is an expert in the area of cyber terrorism and a leader in developing public/private relationships that work. In the later years of his career with the FBI, he was the face of InfraGard North Carolina. InfraGard is an information sharing and analysis effort …