QR code Protus3 holiday card

A Quick Response Isn’t Always the Best Response

Amanda StricklandComputer Forensics

Recently both state and federal officials have been sending out alerts related to malicious QR (quick response) codes. With the increased use of QR codes, scammers are turning to this technology and redirecting victims to malicious websites. So what is a QR (quick response) code? Basically, it’s a series of squares arranged in a matrix or grid shape to create …

ThreatPost article

Leaked Data and Targeted Attacks

Russell W. Gilmore, CISSP, CISM, EnCEIntellectual Property

How can leaked data cause a targeted attack? Have you ever wondered why you got a suspicious email from a bank where you have an account? How about the emails about needing to change a password for a service? Let’s not forget the calls to your cell about your power being cut off or your computer being hacked. The information …

bring your own device

Security Concerns for Personal Devices in the Workplace (BYOD)

Russell W. Gilmore, CISSP, CISM, EnCESecurity Program Development

We first addressed personal devices in the workplace back in 2018. That seems like such a long time ago now. With record numbers of employees now working from home due to COVID, how should we think about personal devices in the workplace? What are some of the security concerns that you should address? When work occurs on personal devices, how …

graphic from article

Technology in My Divorce

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Mobile Forensics

The standard issues involved with a divorce or separation are most often very difficult. In the past decade I have seen these difficult situations made even more difficult because of technology. Text messages, emails, smartphones, and other technology are relevant in many of the cases we see. As computer forensics consultants, we are asked to check computers for keylogging software …

two-factor authentication

Two-Factor Authentication

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics

What is two-factor authentication? Two-factor authentication is a second level of authentication for you the user to be able to access your account. The first level of authentication is your user ID and password. What that means is that anybody with your user ID and password can log into your web-based accounts whether it’s your email account, Office 365, your …

digital forensics expert

Five Reasons to Hire a Digital Forensics Expert

Amanda StricklandComputer Forensics

There are a variety of situations in a company that may require an investigation involving electronic data. This may take the form of a disgruntled employee walking out with client lists, an allegation of harassment via email or text, or simply an employee viewing inappropriate content on their computer. No matter the situation, if it involves any form of electronic …

Remote Work Involves These 3 Cyber Security Risks

Russell W. Gilmore, CISSP, CISM, EnCENews

A recent online Forbes article written by Carrie Rubinstein pointed out 3 Cyber Security Risks created by employees working remotely. Prior to COVID-19, the Bureau of Labor Statistics identified that approximately 29 percent of Americans were able to work remotely. As a result of the implementation of safety measures related to COVID-19, employers are requiring more of their staff to …

phishing scams

Phishing Scams and SMShishing Scams

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Mobile Forensics

In today’s technology-based world, phishing email scams have become commonplace. Whether simple or complex these scams are often effective. Both companies and individuals fall victim to phishing scams leading to the loss of billions of dollars annually. Phishing scams typically involves a cybercriminal impersonating a legitimate company or individual. They attempt to gain access to personal or private information such …

computer screen

Digital Delinquency: How to Respond to Employee Data Theft, Cyberbullying, and More

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Intellectual Property, Mobile Forensics, Theft, Embezzlement, and Fraud

Employers today are armed with more technology than ever before—with state-of-the art tools that improve productivity, enhance communication, and ultimately help to boost our bottom lines. But the more we rely on digital tools to create, store, and share data, the more vulnerable we become to employee digital data theft. Similarly, digital methods of communication can often open the door …

dark web login article

Stolen Login Credentials on the Dark Web

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Mobile Forensics

Just because the company you work for is not a Fortune 500 company does not mean your credentials were not stolen at some point. According to an article in Security Magazine, 21 million login credentials stolen from Fortune 500 companies were found on the Dark Web. Bleepingcomputer.com reported that only 4.9 million of the passwords were unique. Just imagine what …