Wake STEM Early College High School at Protus3

Wake STEM Early College High School at Protus3

Protus3 Computer Forensics, Mobile Forensics, News, Security Schematic Design, Training

Protus3 was excited to invite four students from the Wake STEM Early College High School into the office for a day of Job Shadowing. This is one of the best ways to learn and gain experience all while making connections with professionals. The students were specifically interested in Forensic Science, IT Technology, Cyber Security, and Criminal Investigating. Our experts showed …

data erased

Employee Deception: Too Little, Too Late

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Embezzlement, Fraud, Theft, Theft, Embezzlement, and Fraud, Uncategorized

Protus3 conducts a wide variety of corporate investigations related to employee deception. Some of the more common issues involve harassment complaints or theft of data. Sometimes these issues appear while the employee is still with the company. In other cases, the employee deception does not come to light for weeks or months after they have left the company. Even when …

CLE training

Continuing Legal Education (CLE) Presented by Protus3

Protus3 Background Investigation, Computer Forensics, News, Training, Workplace Violence

Protus3 presented three training classes that have been approved for 6.00 hours of Continuing Legal Education (CLE) by the North Carolina State Bar. Courses and their descriptions are listed below. Managing Aggressive Behavior and Workplace Violence for Law Offices presented by Christine L. Peterson, CPP, ISP This continuing legal education course provides format, structure, and information to students such that …

Security Magazine article

Why Employees are Your Greatest Cyber Risk

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Fraud, Mobile Forensics, News, Theft, Training

A company will do everything it can to protect its network and data. They hire information security experts and purchase security software and hardware to protect from outside intrusions. They do a number of things to reduce their cyber risk. Most are missing the largest risk to their data – the employee. A recent study finds that nearly two in …

Rusty Gilmore

Rusty Gilmore Interviewed by WRAL

Protus3 Computer Forensics, News

An investigation that began in Wake County of nude photos of high school students on Instagram has expanded to at six more North Carolina counties, bringing the total to at least nine, a spokeswoman for the state Department of Justice said Wednesday. School system representatives have said they are cooperating with authorities in the investigation, and authorities are urging parents …

power shift button

Held Hostage by a Dishonest Employee

Russell W. Gilmore, CISSP, CISM, EnCE Compliance, Computer Forensics, Corporate Compliance, Security Policy and Procedure Development, Security Program Development, Theft, Theft, Embezzlement, and Fraud

I recently was involved in a case in which a company employee was discovered using a company credit card for personal reasons. This happens occasionally, and one would think that immediately terminating the¬†dishonest employee would resolve the issue. But what happens when the employee is the one and only IT person for the company? Many companies have only one person …

Christine Peterson

RMA Presents BYOD Policies at RTP CFO Forum

Protus3 News, Security Program Development, Training

Chris Peterson and http://www.rmasecurity.com/about-rma/team-profiles/russell-w-gilmore/ presented BYOD (Bring Your Own Device): Issues and Implications for Companies at the September RTP CFO Forum. The program discussed security issues and considerations for companies when employees connect personal devices to the company network. What issues need to be considered to accommodate lawsuits, audits, and records requests? How can companies prepare for lost or stolen …

RMA Presents Continuing Education Training

Protus3 Computer Forensics, News, Training

RMA presented six hours of training to students in Raleigh, NC. Rusty Gilmore provided training on Computer Forensics. Billy Green presented A Pragmatic Approach to the Terrorist Threat. Tasha Dyson taught a course on Report Writing and Documentation. Mike Epperly provided information on Legal Issues for Private Investigators. Each of these classes is new or has been updated in 2013. …

pink slip

Terminating an Employee and Company Data

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Corporate Compliance, Theft, Theft, Embezzlement, and Fraud

Having to terminate an employee is never easy. To make the process even more difficult, consider the recent survey conducted by Harris Interactive on behalf of Courion which stated that 19% of employees age 18 to 34 would take company data with them if they knew they were about to be fired. Read the full story here. Depending on the …

RMA Presents Continuing Education Training

Protus3 News, Training

RMA presented six hours of training to students in Raleigh, NC. Rusty Gilmore provided training on Computer Forensics. Billy Green presented A Pragmatic Approach to the Terrorist Threat. Tasha Dyson taught a course on Report Writing and Documentation. Mike Epperly provided information on Legal Issues for Private Investigators. Each of these classes is new or has been updated in 2013. …