Wake STEM Early College High School at Protus3

Wake STEM Early College High School at Protus3

Protus3 Computer Forensics, Mobile Forensics, News, Security Schematic Design, Training

Protus3 was excited to invite four students from the Wake STEM Early College High School into the office for a day of Job Shadowing. This is one of the best ways to learn and gain experience all while making connections with professionals. The students were specifically interested in Forensic Science, IT Technology, Cyber Security, and Criminal Investigating. Our experts showed …

laptop with lock on it

Two-Factor Authentication: A Resolution That Works

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Mobile Forensics, Security Policy and Procedure Development, Theft, Embezzlement, and Fraud

Many people ring in the New Year with celebrations and hopes of a better year. The New Year symbolizes the ending of one year and the beginning of another even better year. Some offer advice to bring happiness and prosperity to others: Eat twelve grapes at midnight or eat black-eyed peas on January 1. My advice is more concrete and …

FBI logo

FBI Tech Tuesday: Building a Digital Defense Against Travel Scams

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Mobile Forensics, News, Security Program Development, Training

The FBI investigates many categories of crimes including travel scams. As a result, they receive many tips that can be beneficial to the public when passed along. I am glad that the FBI has increased the process of alerting and educating the public about certain security issues. This is most evident as it relates to internet and computer security. Most …

US-CERT

Back-to-School Cyber Safety

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics, News, Security Program Development

It is that time of year again for many parents to think about cyber safety for their children. We are sending our children back to school. They have their phones, tablets and computers and are ready to start a new year. This is the perfect time to think about their cyber safety. One such safety category is keeping your children …

infosecurity article 2018-08

PGA Hack

Russell W. Gilmore, CISSP, CISM, EnCE Mobile Forensics, News, Security Program Development

It appears the PGA was hacked and fell victim to a ransomware attack. According to some reports, attackers used BitPaymer Ransomware. As a result, attackers can hack into remote desktop services connected to the internet. If I have said it once I have said it a hundred times: Do not allow Remote Desktop Services to connect into your network from …

Security Magazine article

Why Employees are Your Greatest Cyber Risk

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Fraud, Mobile Forensics, News, Theft, Training

A company will do everything it can to protect its network and data. They hire information security experts and purchase security software and hardware to protect from outside intrusions. They do a number of things to reduce their cyber risk. Most are missing the largest risk to their data – the employee. A recent study finds that nearly two in …

TBJ article

Millions evaporate as trade secrets lawsuits fly across NC, US

Russell W. Gilmore, CISSP, CISM, EnCE Diversion, Fraud, Mobile Forensics, News, Theft

The July 6, 2018, issue of the Triangle Business Journal included an article entitled “Millions evaporate as trade secrets lawsuits fly across NC, US”. This article provided good information about the increase in the theft of company-owned data. We have also seen an increase of data theft investigations at Protus3. We work side-by-side with law firms to provide evidence of …

technology rush

The Wild West of Bring Your Own Device (BYOD)

Tasha D. Dyson Compliance, Computer Forensics, Mobile Forensics

The Wild West When you think about the Wild West, what do you see? Do you picture unspoiled scenery, picturesque cattle drives, spacious farms, gold miners, unfettered individual freedom, rugged individualism, and no federal income taxes? This is definitely a “romantic” picture. Remember the darker side. Don’t forget about the lawless gangs of robbers, disputes settled by gunfights, and clashes …

article from The Hacker News

Mobile App Data Leaked

Protus3 Computer Forensics, Mobile Forensics, News

Sometimes mobile apps do more than we think they do. Researchers at the Kromtech Security Center discovered personal data being collected by a smartphone virtual keyboard app on its 31 million users, as reported by The Hacker News. The leaked information included: Full name, phone number, and email address Device name, screen resolution, and model details Android version, IMSI number, …

Is the Answer on a Mobile Device?

Russell W. Gilmore, CISSP, CISM, EnCE Electronic Data Recovery, Mobile Forensics

Quite often, yes. Clients have been complaining that John, your sales representative, hasn’t been showing up to scheduled appointments for months. You have also noticed that his area sales have been rapidly declining. However, John has been submitting reports for all the expenses he’s incurred while traveling. You decided to fire John due to the discrepancies in his reports. Now …