FBI logo

FBI Tech Tuesday: Building a Digital Defense Against Travel Scams

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Mobile Forensics, News, Security Program Development, Training

The FBI is tasked with investigating many categories of crimes including travel scams. As a result, they receive many tips that can be beneficial to the public when passed along. I can say with experience that the FBI has increased the process of alerting and educating the public about certain security and safety issues. This is most evident as it …

US-CERT

Back-to-School Cyber Safety

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics, News, Security Program Development

It is that time of year again for many parents. We are sending our children back to school. They have their phones, tablets and computers and are ready to start a new year. This is the perfect time to think about their safety. One such safety category is keeping your children safe online. The United States Computer Emergency Readiness Team …

infosecurity article 2018-08

PGA Hack

Russell W. Gilmore, CISSP, CISM, EnCE Mobile Forensics, News, Security Program Development

It appears the PGA was hacked and fell victim to a ransomware attack. According to some reports, attackers used BitPaymer Ransomeware, which allows attackers to hack into remote desktop services connect to the internet. If I have said it once I have said it a hundred times: Do not allow Remote Desktop Services connection into your network from the internet. …

Security Magazine article

Why Employees are Your Greatest Cyber Risk

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Fraud, Mobile Forensics, News, Theft, Training

A company will do everything it can to protect its network and data. They hire information security experts and purchase security software and hardware to protect from outside intrusions. Most are missing the largest risk to their data, the employee. A recent study finds that nearly two in five workers admitted to clicking on a link or opening an attachment …

TBJ article

Millions evaporate as trade secrets lawsuits fly across NC, US

Russell W. Gilmore, CISSP, CISM, EnCE Diversion, Fraud, Mobile Forensics, News, Theft

The July 6, 2018, issue of the Triangle Business Journal included an article entitled “Millions evaporate as trade secrets lawsuits fly across NC, US”. This article provided good information about the increase in the theft of company-owned data. You can access the full article here. We have also seen an increase of data theft investigations at Protus3 and work side-by-side …

technology gold rush

The Wild West of Bring Your Own Device (BYOD)

Tasha D. Dyson Compliance, Computer Forensics, Mobile Forensics

The Wild West When you think about the Wild West, what do you see? Do you picture unspoiled scenery, picturesque cattle drives, spacious farms, gold miners, unfettered individual freedom, rugged individualism, and no federal income taxes? This is definitely a “romantic” picture. Remember the darker side. Don’t forget about the lawless gangs of robbers, disputes settled by gunfights, and clashes …

three people texting

Benefits and Disadvantages of BYOD

Russell W. Gilmore, CISSP, CISM, EnCE Compliance, Computer Forensics, Mobile Forensics, Security Policy and Procedure Development

With BYOD, a single individual has the capacity to affect himself, those close to him, the company, and potentially millions of other people. One unsecured device can harm millions of individuals and organizations who may become unsuspecting and unwilling participants. These “collateral damage” participants often have no say in how these risks are managed. Read more about the BYOD Wild …

article from The Hacker News

Mobile App Data Leaked

Protus3 Computer Forensics, Mobile Forensics, News

Sometimes mobile apps do more than we think they do. Researchers at the Kromtech Security Center discovered personal data being collected by a smartphone virtual keyboard app on its 31 million users, as reported by The Hacker News. The leaked information included: Full name, phone number, and email address Device name, screen resolution, and model details Android version, IMSI number, …

Is the Answer on a Mobile Device?

Russell W. Gilmore, CISSP, CISM, EnCE Electronic Data Recovery, Mobile Forensics

Quite often, yes. Clients have been complaining that John, a sales representative at your company, hasn’t been showing up to scheduled appointments for months, and you noticed his area sales have been rapidly declining. However, John has been submitting reports for all the expenses he’s incurred while traveling. You decided to fire John due to the discrepancies in his reports, …