CLE training

April Continuing Legal Education (CLE)

Protus3 Background Investigation, Computer Forensics, News, Training, Workplace Violence

Protus3 presented three training classes that have been approved for 6.00 hours of Continuing Legal Education (CLE) by the North Carolina State Bar. Courses and their descriptions are listed below. Managing Aggressive Behavior and Workplace Violence for Law Offices presented by Christine L. Peterson, CPP, ISP This continuing legal education course provides format, structure, and information to students such that …

data erased

Employee Deception: Too Little, Too Late

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Embezzlement, Fraud, Theft, Theft, Embezzlement, and Fraud, Uncategorized

Protus3 conducts a wide variety of corporate investigations related to employee deception. Some of the more common issues involve harassment complaints or theft of data. Sometimes these issues appear while the employee is still with the company. In other cases, the employee deception does not come to light for weeks or months after they have left the company. Even when …

CLE training

Continuing Legal Education (CLE) Presented by Protus3

Protus3 Background Investigation, Computer Forensics, News, Training, Workplace Violence

Protus3 presented three training classes that have been approved for 6.00 hours of Continuing Legal Education (CLE) by the North Carolina State Bar. Courses and their descriptions are listed below. Managing Aggressive Behavior and Workplace Violence for Law Offices presented by Christine L. Peterson, CPP, ISP This continuing legal education course provides format, structure, and information to students such that …

Security Magazine article

Why Employees are Your Greatest Cyber Risk

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Fraud, Mobile Forensics, News, Theft, Training

A company will do everything it can to protect its network and data. They hire information security experts and purchase security software and hardware to protect from outside intrusions. They do a number of things to reduce their cyber risk. Most are missing the largest risk to their data – the employee. A recent study finds that nearly two in …

TBJ article

Millions evaporate as trade secrets lawsuits fly across NC, US

Russell W. Gilmore, CISSP, CISM, EnCE Diversion, Fraud, Mobile Forensics, News, Theft

The July 6, 2018, issue of the Triangle Business Journal included an article entitled “Millions evaporate as trade secrets lawsuits fly across NC, US”. This article provided good information about the increase in the theft of company-owned data. We have also seen an increase of data theft investigations at Protus3. We work side-by-side with law firms to provide evidence of …

Question Mark Key on Computer Keyboard

Electronically Stored Information – More than Just Domestic Cases

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

I receive calls from attorneys and clients on a daily basis. Some I have worked for in the past and some got my name from a colleague. In most cases, there is an issue involving electronic data, computers, mobile devices or the internet. Anytime electronically stored information becomes part of a civil or criminal matter, it can get very confusing. …

computer forensics

Five Computer Forensics Myths Debunked

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

The media has presented a picture of computer forensics and the collection of data from a mobile device as a glamorous, fast process only used in high profile cases such as murder, espionage, and corruption. This is not the case. Let’s address a few common myths about computer forensics. Myth 1: Computer forensics is only used in high-profile cases or …