Digital Delinquency: How to Respond to Employee Data Theft, Cyberbullying, and More

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Intellectual Property, Mobile Forensics, Theft, Embezzlement, and Fraud

Employers today are armed with more technology than ever before—with state-of-the art tools that improve productivity, enhance communication, and ultimately help to boost our bottom lines. But the more we rely on digital tools to create, store, and share data, the more vulnerable we become to employee digital data theft. Similarly, digital methods of communication can often open the door …

HPG Employee Theft Article

From HPG – Guard against Losses from Employee Theft

Tasha Dyson, CFE Compliance, Embezzlement, Fraud, Security Program Development, Theft, Theft, Embezzlement, and Fraud

Employee theft costs companies billions of dollars a year. This poses a very serious threat to profitability if left unchecked. Therefore, every business needs to set up some internal controls to thwart this type of fraud. This article from Hughes Pittman & Gupton, LLP entitled “Guard against Losses from Employee Theft” looks at a few simple steps to take that …

pink slip

Terminating an Employee and Company Data

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Corporate Compliance, Theft, Theft, Embezzlement, and Fraud

Having to terminate an employee is never easy. To make the process even more difficult, consider the recent survey conducted by Harris Interactive on behalf of Courion which stated that 19% of employees age 18 to 34 would take company data with them if they knew they were about to be fired. Read the full story here. Depending on the …

InfraGard logo

NC companies’ Secrets at Risk, Cyber Terrorism Experts Say

Protus3 Computer Forensics, Electronic Data Recovery, Fraud, News, Theft

In this day and age, sometimes it is difficult to discern truth from fiction. Greg Baker is an expert in the area of cyber terrorism and a leader in developing public/private relationships that work. In the later years of his career with the FBI, he was the face of InfraGard North Carolina. InfraGard is an information sharing and analysis effort …

laptop with lock on it

When Employees Leave, Data Should Stay

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

As a security consultant, quite often I am asked to assist with the hiring and termination of employees. The hiring process generally includes background checks, reference interviews, and financial history, along with other information. My involvement in the termination process is as a third-party observer and advisor. As a computer forensics expert and consultant, I am often called in sometime …

Painful Lessons from Leland

Christine L. Peterson, CPP, ISP Background Investigation

SBI investigates Leland’s former Asst. Town Manager Excerpts from article: Michelle Cox was hired by the Town of Leland in January, and left after about six months on the job. During that time she was the highest ranking female employee in Leland, and was assigned to investigate claims of sexual harassment filed by Officer Sherry Lewis. About the same time, …

A thief sifts and examines shredded documents

Protecting Competitive Intelligence

Christine L. Peterson, CPP, ISP Uncategorized

As the holiday season approaches, Hollywood will begin to bombard us with movies that depict good looking men, beautiful women, and fancy cars or other electronics in romantic stories of intrigue and espionage. As Americans, we love these stories where the main characters wear beautiful clothes and against all odds, often times with cutting edge electronics or personality, save the …

Scientist Pleads Guilty to Stealing Secrets

Protus3 Fraud

September 15, The Associated Press – (International) Ind. scientist agrees to plead guilty to stealing secrets from Dow, sending to China, Germany. A former Indiana scientist has agreed to plead guilty to charges of illegally sending trade secrets worth $300 million to China and Germany. A federal judge September 15 scheduled a plea hearing for October 18. The suspect could …

The Cost of Security

Protus3 Fraud, Security Program Development

The former director of a North Carolina Central University program designed to help minority students used an unauthorized bank account to divert more than $1 million from the program over six years, according to a state audit (WRAL News Story). What can we learn from this story? It’s usually easier and cheaper for companies and organizations to be proactive rather …

A Locked Room

Protus3 Uncategorized

On Monday, an employee reports that there is one monitor missing from the shipment of new monitors that was received the previous Friday. The quantity was verified at delivery by the shipping company and two of your employees. The interior door to the loading dock was locked on Friday evening and was still locked on Monday morning. The roll-up loading …