infosecurity article 2018-08

PGA Hack

Russell W. Gilmore, CISSP, CISM, EnCEMobile Forensics, News, Security Program Development

It appears the PGA was hacked and fell victim to a ransomware attack. According to some reports, attackers used BitPaymer Ransomware. As a result, attackers can hack into remote desktop services connected to the internet. If I have said it once I have said it a hundred times: Do not allow Remote Desktop Services to connect into your network from …

Security Magazine article

Why Employees are Your Greatest Cyber Risk

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Mobile Forensics, News, Theft, Embezzlement, and Fraud, Training

A company will do everything it can to protect its network and data. They hire information security experts and purchase security software and hardware to protect from outside intrusions. They do a number of things to reduce their cyber risk. Most are missing the largest risk to their data – the employee. A recent study finds that nearly two in …

Continuing Education – Legal

Protus3 Legal Learning Digital Forensics for Legal Professionals Intelligence Gathering for Legal Professionals THESE COURSES HAVE BEEN APPROVED FOR 2.00 HOURS OF CLE BY THE NORTH CAROLINA STATE BAR. Training Dates – 2020These courses have been approved for 2.00 hours of CLE by the North Carolina State Bar.11:00AM – 1:30PMDigital Forensics for Legal Professionals FREE ONLINE CLASS December 11, 2020Intelligence …

Request a Speaker

Several of our team members are available to speak on various topics, including: Integrated Security: What is it, and why do you care? Why Background Screening Is Vital For Every Business Training: When to intervene… call security… or call the police Digital Asset Protection: Beyond passwords and firewalls to digital forensics and BYOD Low Hanging Fruit: Lights, camera, action! Preventive …

TBJ article

Millions Evaporate as Trade Secrets Lawsuits Fly Across NC, US

Russell W. Gilmore, CISSP, CISM, EnCEMobile Forensics, News, Theft, Embezzlement, and Fraud

The July 6, 2018, issue of the Triangle Business Journal included an article entitled “Millions evaporate as trade secrets lawsuits fly across NC, US”. This article provided good information about the increase in the theft of company-owned data. We have also seen an increase of data theft investigations at Protus3. We work side-by-side with law firms to provide evidence of …

PBS News Hour Article

Security Clearance Checks for Federal Government to be Handled by Federal Government

Christine L. Peterson, CPP, ISPBackground Investigation, News

At the moment, this only applies to background investigations involving military and civilian employees and contractors for Defense Department. These security clearance checks represent the largest portion of OPM’s current workload and backlog. As a security company that provides background screening services, we are watching this in the hopes that it will support better automation, accuracy, and resources for all …

technology rush

The Wild West of Bring Your Own Device (BYOD)

Tasha Dyson, CFECompliance, Computer Forensics, Mobile Forensics

The Wild West When you think about the Wild West, what do you see? Do you picture unspoiled scenery, picturesque cattle drives, spacious farms, gold miners, unfettered individual freedom, rugged individualism, and no federal income taxes? This is definitely a “romantic” picture. Remember the darker side. Don’t forget about the lawless gangs of robbers, disputes settled by gunfights, and clashes …

bring your own device

Benefits and Disadvantages of BYOD

Russell W. Gilmore, CISSP, CISM, EnCESecurity Program Development

What is BYOD? BYOD is an acronym for “Bring Your Own Device.” It refers to the practice of employees using a personal device for work. With BYOD, a single individual has the capacity to affect himself, those close to him, the company, and potentially millions of other people. One unsecured device can harm millions of individuals and organizations who may …

GDPR and EU Flag

What is GDPR and does it affect me?

Jerry T. Blanchard, Jr., CPPCompliance, News, Security System Lifespan Management

GDPR is the General Data Protection Regulation adopted by the European Union (EU) in 2016. This just became enforceable as of May 2018. Does it affect me? The short answer is “Yes”. This law may affect you if you have an enterprise class system that collects and shares data around the world. What is GDPR? In a nutshell, GDPR is …

Christine Peterson

FBI Insider Threat for Small Business Program

Amanda StricklandNews

On May 31, 2018, the FBI held an Insider Threat for Small Business program at their Charlotte, NC, office. Attendance was by invitation only. Christine Peterson attended on behalf of the partnerships that Protus3 builds with clients to protect their assets. As a big fan of the concept “Together is Better” Protus3 believes that it takes a community working together …