CLE training

April Continuing Legal Education (CLE)

Protus3 Background Investigation, Computer Forensics, News, Training, Workplace Violence

Protus3 presented three training classes that have been approved for 6.00 hours of Continuing Legal Education (CLE) by the North Carolina State Bar. Courses and their descriptions are listed below. Managing Aggressive Behavior and Workplace Violence for Law Offices presented by Christine L. Peterson, CPP, ISP This continuing legal education course provides format, structure, and information to students such that …

data erased

Employee Deception: Too Little, Too Late

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Embezzlement, Fraud, Theft, Theft, Embezzlement, and Fraud, Uncategorized

Protus3 conducts a wide variety of corporate investigations related to employee deception. Some of the more common issues involve harassment complaints or theft of data. Sometimes these issues appear while the employee is still with the company. In other cases, the employee deception does not come to light for weeks or months after they have left the company. Even when …

CLE training

Continuing Legal Education (CLE) Presented by Protus3

Protus3 Background Investigation, Computer Forensics, News, Training, Workplace Violence

Protus3 presented three training classes that have been approved for 6.00 hours of Continuing Legal Education (CLE) by the North Carolina State Bar. Courses and their descriptions are listed below. Managing Aggressive Behavior and Workplace Violence for Law Offices presented by Christine L. Peterson, CPP, ISP This continuing legal education course provides format, structure, and information to students such that …

Security Magazine article

Why Employees are Your Greatest Cyber Risk

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Fraud, Mobile Forensics, News, Theft, Training

A company will do everything it can to protect its network and data. They hire information security experts and purchase security software and hardware to protect from outside intrusions. They do a number of things to reduce their cyber risk. Most are missing the largest risk to their data – the employee. A recent study finds that nearly two in …

TBJ article

Millions evaporate as trade secrets lawsuits fly across NC, US

Russell W. Gilmore, CISSP, CISM, EnCE Diversion, Fraud, Mobile Forensics, News, Theft

The July 6, 2018, issue of the Triangle Business Journal included an article entitled “Millions evaporate as trade secrets lawsuits fly across NC, US”. This article provided good information about the increase in the theft of company-owned data. We have also seen an increase of data theft investigations at Protus3. We work side-by-side with law firms to provide evidence of …