Technology in My Divorce

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics

The standard issues involved with a divorce or separation are most often very difficult. In the past decade I have seen these difficult situations made even more difficult because of technology. Text messages, emails, smartphones, and other technology are relevant in many of the cases we see. As computer forensics consultants, we are asked to check computers for keylogging software …

two-factor authentication

Two-Factor Authentication

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

What is two-factor authentication? Two-factor authentication is a second level of authentication for you the user to be able to access your account. The first level of authentication is your user ID and password. What that means is that anybody with your user ID and password can log into your web-based accounts whether it’s your email account, Office 365, your …

A Year and a Day Podcast

Protecting Your Electronic Devices and Data during a Divorce

Protus3 Computer Forensics

People often have questions about how to best protect their children and their assets during a divorce, but one area that they often overlook is protecting their data and making sure that their spouse can’t access their devices accidentally or otherwise. In this episode host Jaime Davis of Gailor Hunt explores this topic with Rusty Gilmore, a Security Consultant and …

digital forensics expert

Five Reasons to Hire a Digital Forensics Expert

Amanda Strickland Computer Forensics

There are a variety of situations in a company that may require an investigation involving electronic data. This may take the form of a disgruntled employee walking out with client lists, an allegation of harassment via email or text, or simply an employee viewing inappropriate content on their computer. No matter the situation, if it involves any form of electronic …

dark web login article

Stolen Login Credentials on the Dark Web

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics

Just because the company you work for is not a Fortune 500 company does not mean your credentials were not stolen at some point. According to an article in Security Magazine, 21 million login credentials stolen from Fortune 500 companies were found on the Dark Web. Bleepingcomputer.com reported that only 4.9 million of the passwords were unique. Just imagine what …

CLE training

April Continuing Legal Education (CLE)

Protus3 Background Investigation, Computer Forensics, News, Training, Workplace Violence

Protus3 presented three training classes that have been approved for 6.00 hours of Continuing Legal Education (CLE) by the North Carolina State Bar. Courses and their descriptions are listed below. Managing Aggressive Behavior and Workplace Violence for Law Offices presented by Christine L. Peterson, CPP, ISP This continuing legal education course provides format, structure, and information to students such that …

Wake STEM Early College High School at Protus3

Wake STEM Early College High School at Protus3

Protus3 Computer Forensics, Mobile Forensics, News, Security Schematic Design, Training

Protus3 was excited to invite four students from the Wake STEM Early College High School into the office for a day of Job Shadowing. This is one of the best ways to learn and gain experience all while making connections with professionals. The students were specifically interested in Forensic Science, IT Technology, Cyber Security, and Criminal Investigating. Our experts showed …

data erased

Employee Deception: Too Little, Too Late

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Embezzlement, Fraud, Theft, Theft, Embezzlement, and Fraud

Protus3 conducts a wide variety of corporate investigations related to employee deception. Some of the more common issues involve harassment complaints or theft of data. Sometimes these issues appear while the employee is still with the company. In other cases, the employee deception does not come to light for weeks or months after they have left the company. Even when …

CLE training

Continuing Legal Education (CLE) Presented by Protus3

Protus3 Background Investigation, Computer Forensics, News, Training, Workplace Violence

Protus3 presented three training classes that have been approved for 6.00 hours of Continuing Legal Education (CLE) by the North Carolina State Bar. Courses and their descriptions are listed below. Managing Aggressive Behavior and Workplace Violence for Law Offices presented by Christine L. Peterson, CPP, ISP This continuing legal education course provides format, structure, and information to students such that …

Security Magazine article

Why Employees are Your Greatest Cyber Risk

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Fraud, Mobile Forensics, News, Theft, Training

A company will do everything it can to protect its network and data. They hire information security experts and purchase security software and hardware to protect from outside intrusions. They do a number of things to reduce their cyber risk. Most are missing the largest risk to their data – the employee. A recent study finds that nearly two in …