The media has presented a picture of computer forensics and the collection of data from a mobile device as a glamorous, fast process only used in high profile cases such as murder, espionage, and corruption. This is not the case. Let’s address a few common myths about computer forensics. Myth 1: Computer forensics is only used in high-profile cases or …
Rusty Gilmore Interviewed by WRAL
An investigation that began in Wake County of nude photos of high school students on Instagram has expanded to at six more North Carolina counties, bringing the total to at least nine, a spokeswoman for the state Department of Justice said Wednesday. School system representatives have said they are cooperating with authorities in the investigation, and authorities are urging parents …
Held Hostage by a Dishonest Employee
I recently was involved in a case in which a company employee was discovered using a company credit card for personal reasons. This happens occasionally, and one would think that immediately terminating the dishonest employee would resolve the issue. But what happens when the employee is the one and only IT person for the company? Many companies have only one person …
Terminating an Employee and Company Data
Having to terminate an employee is never easy. To make the process even more difficult, consider the recent survey conducted by Harris Interactive on behalf of Courion which stated that 19% of employees age 18 to 34 would take company data with them if they knew they were about to be fired. Read the full story here. Depending on the …
Government Files First Criminal Charges In BP Oil Spill
As businesses have evolved and grown, so have the ways we communicate. It is no longer as simple as a letter, meeting, or a phone call. We send emails, have video chats, communicate with instant messages, and send text messages at an exponential rate. Have you ever stopped to consider how your company would respond to a preservation letter or …
When Employees Leave, Data Should Stay
As a security consultant, quite often I am asked to assist with the hiring and termination of employees. The hiring process generally includes background checks, reference interviews, and financial history, along with other information. My involvement in the termination process is as a third-party observer and advisor. As a computer forensics expert and consultant, I am often called in sometime …
The Basics of Computer Forensics
In recent years, shows like CSI and others have made the general public aware of the concept of forensics – the use of science and technology to investigate and establish facts in criminal or civil courts of law (Source: www.dictionary.com). However, based on storytelling time constraints imposed on television shows and movies, certain processes and procedures are often oversimplified, enhanced, and …
- Page 2 of 2
- 1
- 2






