graphic from article

Technology in My Divorce

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Mobile Forensics

The standard issues involved with a divorce or separation are most often very difficult. In the past decade I have seen these difficult situations made even more difficult because of technology. Text messages, emails, smartphones, and other technology are relevant in many of the cases we see. As computer forensics consultants, we are asked to check computers for keylogging software …

two-factor authentication

Two-Factor Authentication

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics

What is two-factor authentication? Two-factor authentication is a second level of authentication for you the user to be able to access your account. The first level of authentication is your user ID and password. What that means is that anybody with your user ID and password can log into your web-based accounts whether it’s your email account, Office 365, your …

A Year and a Day Podcast

Protecting Your Electronic Devices and Data during a Divorce

Protus3Computer Forensics

People often have questions about how to best protect their children and their assets during a divorce, but one area that they often overlook is protecting their data and making sure that their spouse can’t access their devices accidentally or otherwise. In this episode host Jaime Davis of Gailor Hunt explores this topic with Rusty Gilmore, a Security Consultant and …

digital forensics expert

Five Reasons to Hire a Digital Forensics Expert

Amanda StricklandComputer Forensics

There are a variety of situations in a company that may require an investigation involving electronic data. This may take the form of a disgruntled employee walking out with client lists, an allegation of harassment via email or text, or simply an employee viewing inappropriate content on their computer. No matter the situation, if it involves any form of electronic …

dark web login article

Stolen Login Credentials on the Dark Web

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Mobile Forensics

Just because the company you work for is not a Fortune 500 company does not mean your credentials were not stolen at some point. According to an article in Security Magazine, 21 million login credentials stolen from Fortune 500 companies were found on the Dark Web. Bleepingcomputer.com reported that only 4.9 million of the passwords were unique. Just imagine what …

data erased

Employee Deception: Too Little, Too Late

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Electronic Data Recovery, Theft, Embezzlement, and Fraud

Protus3 conducts a wide variety of corporate investigations related to employee deception. Some of the more common issues involve harassment complaints or theft of data. Sometimes these issues appear while the employee is still with the company. In other cases, the employee deception does not come to light for weeks or months after they have left the company. Even when …

Security Magazine article

Why Employees are Your Greatest Cyber Risk

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Mobile Forensics, News, Theft, Embezzlement, and Fraud, Training

A company will do everything it can to protect its network and data. They hire information security experts and purchase security software and hardware to protect from outside intrusions. They do a number of things to reduce their cyber risk. Most are missing the largest risk to their data – the employee. A recent study finds that nearly two in …

technology rush

The Wild West of Bring Your Own Device (BYOD)

Tasha Dyson, CFECompliance, Computer Forensics, Mobile Forensics

The Wild West When you think about the Wild West, what do you see? Do you picture unspoiled scenery, picturesque cattle drives, spacious farms, gold miners, unfettered individual freedom, rugged individualism, and no federal income taxes? This is definitely a “romantic” picture. Remember the darker side. Don’t forget about the lawless gangs of robbers, disputes settled by gunfights, and clashes …

bring your own device

Benefits and Disadvantages of BYOD

Russell W. Gilmore, CISSP, CISM, EnCESecurity Program Development

What is BYOD? BYOD is an acronym for “Bring Your Own Device.” It refers to the practice of employees using a personal device for work. With BYOD, a single individual has the capacity to affect himself, those close to him, the company, and potentially millions of other people. One unsecured device can harm millions of individuals and organizations who may …

Question Mark Key on Computer Keyboard

Electronically Stored Information – More than Just Domestic Cases

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics

Question Mark Key on Computer Keyboard[/caption]>I receive calls from attorneys and clients on a daily basis. Some I have worked for in the past and some got my name from a colleague. In most cases, there is an issue involving electronic data, computers, mobile devices or the internet. Anytime electronically stored information becomes part of a civil or criminal matter, …