What is metadata and why is it important in a computer forensics investigation? A brief definition or explanation of metadata is “data about data.” What does that exactly mean? Data is the file. Data is the Word document, the Excel document, or any other user-created document on the computer. Meta is information about that document. This can include where it’s …
Workplace Violence: What is a Threat Assessment?
What is a threat assessment? One of the things clients frequently ask us has to do with workplace violence. Usually it goes something like this. We get a call from a company. They’re going to fire someone fairly soon, and they’re not sure how he’s going to react. They’re contacting us to see what sort of support we can provide. …
Truth or Consequences? Choose Investigators Wisely
A recent article from HPG provided excellent information about how companies and organizations can take a proactive stand against harassment (read the original article here). As part of the precautions to take, the article recommended an investigation of the complaint. We couldn’t agree more. Few organizations realize that private investigators offer a vast and virtually untapped pool of investigative talent. …
Minor Traffic Offenses Will No Longer Be Reported
At Protus3, we believe that employers should have as much relevant information as possible in order to make the best hiring decisions. We have always prided ourselves on the fact that we report everything we possibly can when conducting pre-employment background investigations. This included everything from felonies all the way down to minor traffic offenses. The FCRA allows us to …
Five Reasons to Hire a Digital Forensics Expert
There are a variety of situations in a company that may require an investigation involving electronic data. This may take the form of a disgruntled employee walking out with client lists, an allegation of harassment via email or text, or simply an employee viewing inappropriate content on their computer. No matter the situation, if it involves any form of electronic …
Remote Work Involves These 3 Cyber Security Risks
A recent online Forbes article written by Carrie Rubinstein pointed out 3 Cyber Security Risks created by employees working remotely. Prior to COVID-19, the Bureau of Labor Statistics identified that approximately 29 percent of Americans were able to work remotely. As a result of the implementation of safety measures related to COVID-19, employers are requiring more of their staff to …
See Something, Say Something Really Works
10 Times See Something, Say Something Saved Lives in 2019 Source: Campus Safety Magazine, www.campussafetymagazine.com We’ve all heard the recommendation: See Something, Say Something. Does it really work? Absolutely. Campus Safety Magazine reported the ten examples below. Each provides an example of how advanced reporting helped to avert a potential incident. So we’ll say it again: See Something, Say Something. …
Why Ignore Physical Security?
One thing that has always amazed me is how so many companies choose not to put a sound physical security solution in place. Don’t get me wrong – I understand that there is a cost. Many companies simply cannot afford to devote money to a security program when they need the money elsewhere. With that said, having security systems in …
Technical Assessments – Standards
Our first post reviewed enclosure conditions and installation practices found in technical assessments. We then discussed the importance of the appropriate installation and conditions of field devices. In this third installment, we are going to discuss one of the best ways to avoid the conditions previously discussed. It’s also how to begin cleaning up the messes that you do find. …
Technical Assessments – Field Devices
In this second installment, we will be looking at field devices. This information comes from practices we have found when conducting a technical assessment. Multiple hardware components make up a security system. The term “head-end” equipment often refers to the server-based computers, client monitoring stations, and security panels. The “head-end” hardware devices communicate with the “field devices” of a particular …








