Blog

Cyber Security: How Do I Protect My Business From a Data Breach

CYBER SECURITY: HOW DO I PROTECT MY BUSINESS FROM A DATA BREACH By Patrick Logan, President and Certified Computer Examiner What is Cyber Security? Cyber Security (or Data Security) concerns the protection of data from accidental or intentional, but unauthorized modification, destruction or disclosure through the use of physical security, administrative controls, logical controls, and […]

Why Digital Forensics Matters to You

Digital Forensics

WHAT IS DIGITAL FORENSICS? Digital Forensics can be defined as the investigation, recovery and analysis of data and evidence within digital devices (computers, smartphones, etc.).  Digital forensic investigations should only be performed by trained and certified examiners who can ensure that the recovery and analysis of any and all evidence is not altered and will […]

Don’t Be a Victim of Whaling

Anyone can be a victim of a cyber fraud attack, including senior executives.  A “whaling” attack is where cyber criminals attempt to “harpoon” an executive, often CEOs and CFOs, and steal log-in credentials.  In the event their attack proves successful, fraudsters can then impersonate the executive and abuse email to authorize fraudulent wire transfers.  Whaling […]

Top Cybersecurity Threats

What are the Top Cybersecurity Threats For the Near Future? Social Engineering Attacks are how hackers and data thieves cleverly access your secure information through phishing, impersonating other companies and people, and other common tactics.  It is estimated that phishing attacks cost U.S. businesses more than five million dollars each year. Ransomware is a relatively […]

IoT Impact on Digital Forensics

The Internet of Things (IoT) is a system of interrelated computing devices and digital objects that are provided with unique identifiers and the ability to transfer data over a network without requiring direct communication between a person and computer.  The growing implementation of the IoT will result in the connection of tens of billions of wireless […]