Technology in My Divorce

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics

The standard issues involved with a divorce or separation are most often very difficult. In the past decade I have seen these difficult situations made even more difficult because of technology. Text messages, emails, smartphones, and other technology are relevant in many of the cases we see. As computer forensics consultants, we are asked to check computers for keylogging software …

Computer Forensics: What is metadata?

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

What is metadata and why is it important in a computer forensics investigation? A brief definition or explanation of metadata is “data about data.” What does that exactly mean? Data is the file. Data is the Word document, the Excel document, or any other user-created document on the computer. Meta is information about that document. This can include where it’s …

HPG article

Truth or Consequences? Choose Investigators Wisely

Tasha Dyson, CFE Compliance, Corporate Compliance

A recent article from HPG provided excellent information about how companies and organizations can take a proactive stand against harassment (read the original article here). As part of the precautions to take, the article recommended an investigation of the complaint. We couldn’t agree more. Few organizations realize that private investigators offer a vast and virtually untapped pool of investigative talent. …

Wake STEM Early College High School at Protus3

Wake STEM Early College High School at Protus3

Protus3 Computer Forensics, Mobile Forensics, News, Security Schematic Design, Training

Protus3 was excited to invite four students from the Wake STEM Early College High School into the office for a day of Job Shadowing. This is one of the best ways to learn and gain experience all while making connections with professionals. The students were specifically interested in Forensic Science, IT Technology, Cyber Security, and Criminal Investigating. Our experts showed …

HPG Employee Theft Article

From HPG – Guard against Losses from Employee Theft

Tasha Dyson, CFE Compliance, Embezzlement, Fraud, Security Program Development, Theft, Theft, Embezzlement, and Fraud

Employee theft costs companies billions of dollars a year. This poses a very serious threat to profitability if left unchecked. Therefore, every business needs to set up some internal controls to thwart this type of fraud. This article from Hughes Pittman & Gupton, LLP entitled “Guard against Losses from Employee Theft” looks at a few simple steps to take that …

time

Why Do Background Investigations Take So Long?

Tasha Dyson, CFE Background Investigation

Time is the number one challenge for employers in the background investigations process. That was one finding in the study entitled “How Human Resource Professionals View the Use and Effectiveness of Background Screening Methods” published by NAPBS and HR.com in June 2018. You can read the entire report here. The report did not include the expectation about how long background …

Question Mark Key on Computer Keyboard

Electronically Stored Information – More than Just Domestic Cases

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

I receive calls from attorneys and clients on a daily basis. Some I have worked for in the past and some got my name from a colleague. In most cases, there is an issue involving electronic data, computers, mobile devices or the internet. Anytime electronically stored information becomes part of a civil or criminal matter, it can get very confusing. …

arrest records

Can You Consider Arrest Records?

Tasha Dyson, CFE Background Investigation, Compliance

Let’s consider arrest records for a moment. Enforcement Guidance on the Consideration of Arrest and Conviction Records in Employment Decisions Under Title VII of the Civil Rights Act of 1964, as amended, 42 U.S.C. § 2000e et seq. published by the Equal Employment Opportunity Commission is an excellent resource. Much of the information in this section comes from that source. …

background screening report

What Should You Expect in a Background Screening Report?

Tasha Dyson, CFE Background Investigation

You’ve read the application, reviewed the resume, and interviewed the candidate. She seems like a good fit, and you’ve made a conditional offer of employment that will be based on the results of background screening report. As part of the background check process, you ask the candidate for additional information, including her past criminal history. (Read more about when to …

criminal history question on application

What is “Ban the Box” and What Does it Mean to You?

Tasha Dyson, CFE Background Investigation, Compliance, News

Here in North Carolina, legislators recently proposed new “Ban the Box” legislation. This legislation would prohibiting state government from asking about a candidate’s criminal history until making a conditional offer of employment (HB 233, HB238, and SB174). “Ban the Box” is already law in other cities, counties, and states, and it is an idea that is gaining in popularity and …