digital forensics expert

Five Reasons to Hire a Digital Forensics Expert

Amanda StricklandComputer Forensics

There are a variety of situations in a company that may require an investigation involving electronic data. This may take the form of a disgruntled employee walking out with client lists, an allegation of harassment via email or text, or simply an employee viewing inappropriate content on their computer. No matter the situation, if it involves any form of electronic …

phishing scams

Phishing Scams and SMShishing Scams

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Mobile Forensics

In today’s technology-based world, phishing email scams have become commonplace. Whether simple or complex these scams are often effective. Both companies and individuals fall victim to phishing scams leading to the loss of billions of dollars annually. Phishing scams typically involves a cybercriminal impersonating a legitimate company or individual. They attempt to gain access to personal or private information such …

computer screen

Digital Delinquency: How to Respond to Employee Data Theft, Cyberbullying, and More

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Intellectual Property, Mobile Forensics, Theft, Embezzlement, and Fraud

Employers today are armed with more technology than ever before—with state-of-the art tools that improve productivity, enhance communication, and ultimately help to boost our bottom lines. But the more we rely on digital tools to create, store, and share data, the more vulnerable we become to employee digital data theft. Similarly, digital methods of communication can often open the door …

Question Mark Key on Computer Keyboard

Electronically Stored Information – More than Just Domestic Cases

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics

Question Mark Key on Computer Keyboard[/caption]>I receive calls from attorneys and clients on a daily basis. Some I have worked for in the past and some got my name from a colleague. In most cases, there is an issue involving electronic data, computers, mobile devices or the internet. Anytime electronically stored information becomes part of a civil or criminal matter, …

digital forensics

Is the Answer on a Mobile Device?

Russell W. Gilmore, CISSP, CISM, EnCEElectronic Data Recovery, Mobile Forensics

Quite often, yes. Clients have been complaining that John, your sales representative, hasn’t been showing up to scheduled appointments for months. You have also noticed that his area sales have been rapidly declining. However, John has been submitting reports for all the expenses he’s incurred while traveling. You decided to fire John due to the discrepancies in his reports. Now …

digital forensics expert

Five Computer Forensics Myths Debunked

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics

The media has presented a picture of computer forensics and the collection of data from a mobile device as a glamorous, fast process only used in high profile cases such as murder, espionage, and corruption. This is not the case. Let’s address a few common myths about computer forensics. Myth 1: Computer forensics is only used in high-profile cases or …

dark web

What Is the Dark Web?

Protus3Computer Forensics

I am not a computer techie, just an average computer, smart phone, and iPad user. I use the Internet for email, word searches, research, and of course the occasional shopping experience. Have you ever wondered: what is the Dark Web? I must admit I am a bit curious. Could it be that bad to just Google the words “Dark Web” …