screenshot of metadata

Computer Forensics: What is metadata?

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics

What is metadata and why is it important in a computer forensics investigation? A brief definition or explanation of metadata is “data about data.” What does that exactly mean? Data is the file. Data is the Word document, the Excel document, or any other user-created document on the computer. Meta is information about that document. This can include where it’s …

HPG article

Truth or Consequences? Choose Investigators Wisely

Tasha Dyson, CFECompliance

A recent article from HPG provided excellent information about how companies and organizations can take a proactive stand against harassment (read the original article here). As part of the precautions to take, the article recommended an investigation of the complaint. We couldn’t agree more. Few organizations realize that private investigators offer a vast and virtually untapped pool of investigative talent. …

stop sign

Minor Traffic Offenses Will No Longer Be Reported

Tasha Dyson, CFEBackground Investigation, News

At Protus3, we believe that employers should have as much relevant information as possible in order to make the best hiring decisions. We have always prided ourselves on the fact that we report everything we possibly can when conducting pre-employment background investigations. This included everything from felonies all the way down to minor traffic offenses. The FCRA allows us to …

digital forensics expert

Five Reasons to Hire a Digital Forensics Expert

Amanda StricklandComputer Forensics

There are a variety of situations in a company that may require an investigation involving electronic data. This may take the form of a disgruntled employee walking out with client lists, an allegation of harassment via email or text, or simply an employee viewing inappropriate content on their computer. No matter the situation, if it involves any form of electronic …

Remote Work Involves These 3 Cyber Security Risks

Russell W. Gilmore, CISSP, CISM, EnCENews

A recent online Forbes article written by Carrie Rubinstein pointed out 3 Cyber Security Risks created by employees working remotely. Prior to COVID-19, the Bureau of Labor Statistics identified that approximately 29 percent of Americans were able to work remotely. As a result of the implementation of safety measures related to COVID-19, employers are requiring more of their staff to …

See Something, Say Something Really Works

Tasha Dyson, CFETraining

10 Times See Something, Say Something Saved Lives in 2019 Source: Campus Safety Magazine, www.campussafetymagazine.com We’ve all heard the recommendation: See Something, Say Something. Does it really work? Absolutely. Campus Safety Magazine reported the ten examples below. Each provides an example of how advanced reporting helped to avert a potential incident. So we’ll say it again: See Something, Say Something. …

Technical Assessments - Standards

Technical Assessments – Standards

Dana Frentz, CHPA, PSPSecurity Assessment, Security Master Planning, Security System Lifespan Management

Our first post reviewed enclosure conditions and installation practices found in technical assessments.  We then discussed the importance of the appropriate installation and conditions of field devices. In this third installment, we are going to discuss one of the best ways to avoid the conditions previously discussed. It’s also how to begin cleaning up the messes that you do find. …

Field Devices

Technical Assessments – Field Devices

Dana Frentz, CHPA, PSPSecurity Assessment, Security System Lifespan Management

In this second installment, we will be looking at field devices. This information comes from practices we have found when conducting a technical assessment. Multiple hardware components make up a security system. The term “head-end” equipment often refers to the server-based computers, client monitoring stations, and security panels. The “head-end” hardware devices communicate with the “field devices” of a particular …