Digital Delinquency: How to Respond to Employee Data Theft, Cyberbullying, and More

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Intellectual Property, Mobile Forensics, Theft, Embezzlement, and Fraud

Employers today are armed with more technology than ever before—with state-of-the art tools that improve productivity, enhance communication, and ultimately help to boost our bottom lines. But the more we rely on digital tools to create, store, and share data, the more vulnerable we become to employee digital data theft. Similarly, digital methods of communication can often open the door …

HPG Employee Theft Article

From HPG – Guard against Losses from Employee Theft

Tasha Dyson, CFE Compliance, Embezzlement, Fraud, Security Program Development, Theft, Theft, Embezzlement, and Fraud

Employee theft costs companies billions of dollars a year. This poses a very serious threat to profitability if left unchecked. Therefore, every business needs to set up some internal controls to thwart this type of fraud. This article from Hughes Pittman & Gupton, LLP entitled “Guard against Losses from Employee Theft” looks at a few simple steps to take that …

Christine Peterson

RMA Presents at CSI Week at Meredith College

Protus3 Embezzlement, Fraud, News, Theft, Embezzlement, and Fraud, Training

Chris Peterson presented Enemies at the Gate – or Are They Already Inside? as part of CSI Week at Meredith College. CSI Week allows students at Meredith to explore career opportunities in law enforcement and related fields. The event is sponsored by the Sociology and Criminology Programs, and the Sociology & Criminology Club (and with the support of Political Science, …

pink slip

Terminating an Employee and Company Data

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Corporate Compliance, Theft, Theft, Embezzlement, and Fraud

Having to terminate an employee is never easy. To make the process even more difficult, consider the recent survey conducted by Harris Interactive on behalf of Courion which stated that 19% of employees age 18 to 34 would take company data with them if they knew they were about to be fired. Read the full story here. Depending on the …

InfraGard logo

NC companies’ Secrets at Risk, Cyber Terrorism Experts Say

Protus3 Computer Forensics, Electronic Data Recovery, Fraud, News, Theft

In this day and age, sometimes it is difficult to discern truth from fiction. Greg Baker is an expert in the area of cyber terrorism and a leader in developing public/private relationships that work. In the later years of his career with the FBI, he was the face of InfraGard North Carolina. InfraGard is an information sharing and analysis effort …

laptop with lock on it

When Employees Leave, Data Should Stay

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

As a security consultant, quite often I am asked to assist with the hiring and termination of employees. The hiring process generally includes background checks, reference interviews, and financial history, along with other information. My involvement in the termination process is as a third-party observer and advisor. As a computer forensics expert and consultant, I am often called in sometime …

Painful Lessons from Leland

Christine L. Peterson, CPP, ISP Background Investigation

SBI investigates Leland’s former Asst. Town Manager Excerpts from article: Michelle Cox was hired by the Town of Leland in January, and left after about six months on the job. During that time she was the highest ranking female employee in Leland, and was assigned to investigate claims of sexual harassment filed by Officer Sherry Lewis. About the same time, …

A thief sifts and examines shredded documents

Protecting Competitive Intelligence

Christine L. Peterson, CPP, ISP Uncategorized

As the holiday season approaches, Hollywood will begin to bombard us with movies that depict good looking men, beautiful women, and fancy cars or other electronics in romantic stories of intrigue and espionage. As Americans, we love these stories where the main characters wear beautiful clothes and against all odds, often times with cutting edge electronics or personality, save the …


Mike Longmire Presents at North Carolina State University

Protus3 News

Mike Longmire presented Security Issues to Materials Management in Construction, a graduate civil engineering course. The focus of the presentation was the difference between safety and security. Because security is not highly regulated like safety, security is often not considered in the initial stages of construction projects as it should be. The presentation also provided discussion and statistics regarding theft …

Scientist Pleads Guilty to Stealing Secrets

Protus3 Fraud

September 15, The Associated Press – (International) Ind. scientist agrees to plead guilty to stealing secrets from Dow, sending to China, Germany. A former Indiana scientist has agreed to plead guilty to charges of illegally sending trade secrets worth $300 million to China and Germany. A federal judge September 15 scheduled a plea hearing for October 18. The suspect could …