computer screen

Digital Delinquency: How to Respond to Employee Data Theft, Cyberbullying, and More

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Intellectual Property, Mobile Forensics, Theft, Embezzlement, and Fraud

Employers today are armed with more technology than ever before—with state-of-the art tools that improve productivity, enhance communication, and ultimately help to boost our bottom lines. But the more we rely on digital tools to create, store, and share data, the more vulnerable we become to employee digital data theft. Similarly, digital methods of communication can often open the door …

Technical Assessments – Installation and Maintenance Issues

Dana Frentz, CHPA, PSPSecurity Assessment, Security System Lifespan Management

This is the first of three blogs concerning the installation and maintenance practices we have found when conducting technical assessments. There are three principal parts of an integrated security plan: people, processes, and technology. As a result, each of these components serves to augment the effectiveness of the other. Looking at technology, there are dozens of electronic security management systems …

dark web login article

Stolen Login Credentials on the Dark Web

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Mobile Forensics

Just because the company you work for is not a Fortune 500 company does not mean your credentials were not stolen at some point. According to an article in Security Magazine, 21 million login credentials stolen from Fortune 500 companies were found on the Dark Web. Bleepingcomputer.com reported that only 4.9 million of the passwords were unique. Just imagine what …

Digital Forensics

CONTACT US(800) 775-8584Contact Us for a Free Digital ForensicsCase EvaluationHOW CAN WE HELP? Computer Forensics Form Please tell us a little bit about your data environment so that we can get the appropriate resources engaged in the conversation. * We collect, use and process your data according to our Privacy Policy. * I agree If you are human, leave this …

You’ve Conducted a Background Check… Now What?

Amanda StricklandBackground Investigation

Hiring new employees is a vital component of any successful business. Every company collects some type of background information. From the initial application to the final interview, employers seek to obtain information in order to assess several qualities about a potential hire. Are they competent? Do they have the right skills? Who is the best person for the position? Running …

lock take hide signs

What is Your Security Culture?

Tasha Dyson, CFESecurity Program Development

These two signs provide the same basic security advice. What makes them different? The culture of the organization. The sign on the left appears in parking decks owned by the City of Raleigh. Similar signs are found in other municipal, government, and public parking lots and decks. “Lock-Take-Hide” is a good, quick reminder to protect vehicles and property in parking …

SSI access control article

Addressing Access Control

Jerry T. Blanchard, Jr., CPPNews, Workplace Violence

Every event like the shooting in Virginia Beach provides us with the ability to reflect on security. How can we better protect personnel? And how do we address access control? The article “Electronic Doors Obstructed Pursuit of Virginia Shooter, Police Say” appeared in both Campus Safety magazine as well as Security Sales & Integration magazine. You can read the original …

trained response and untrained response graphic

Training to Respond to Workplace Violence

Christine L. Peterson, CPP, ISPTraining, Workplace Violence

Last month I wrote about the importance of training as a security tool to support best outcomes in a security event. That post specifically addressed workplace violence and active shooters. Today I want to discuss two things: Our bodies are created for preservation and survival – knowing how it might affect us is important for our wellbeing and best outcomes. …

COMPUTER FORENSICS

MOBILE FORENSICS Follow the data, especially when it goes mobile Mobile devices such as cell phones, tablets, watches, GPS devices, and more are growing increasingly popular. With the growth in the use of mobile devices, so increases the likelihood that these devices may become caught up in either civil litigation or a criminal investigation. When this happens, it is important …