Author: Jon Isenberg

Airport USB charging stations – Are they safe from Data Theft?

IN THE NEWS – ELIJAH Digest | June 27, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. It turns out that those USB charging stations at airports are almost as dangerous as a public wi-fi connection. As IBM Security’s Caleb Barlow recently said, “Plugging into a public USB port is kind of like finding a toothbrush on the side of the road and deciding to stick it in your mouth. You have no idea where that thing has been.” The threat is real. Hackers can easily configure those public USB chargers to deliver dangerous malware to your mobile device. Or, they can install bugs that download data off your smartphone without any warning. Either way, one simple plug into one simple charging station can put your data at risk and if you are using a work device, that risk can spread to your entire company network. According to the 2019… Read more »


Cybersecurity Alert – Google Calendar

IN THE NEWS – ELIJAH Digest | June 27, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. In recent weeks, scammers have developed a new method of luring Google users into getting hacked without their knowledge. This is the Google Calendar notification scam that targets those individuals that use the Google calendar to accept an invitation. The invitation looks normal, but usually contains a link to accept the invitation. Some recent invitations have led users to an illicit website looking to steal personal information. If the link in any document (email or calendar invitation) asks you to log into any account, this may be an indication of a fraudulent link. The recent attack, asked people to log into a website to verify the appointment, leading to credential stealing sites. In the calendar invitation, the scammers can set the number of reminders to deliver the same message until the desired link… Read more »


Have You Seen The New Windows 10 Update (19H1)?

IN THE NEWS – ELIJAH Digest | May 16, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Microsoft is rolling out an update for May that has several changes – some good and some more restrictive. This is the May Update for Windows. The good news is that several of the features are improving to make your work easier. The top new features include: Project your Android phone screen on your PC. An even better light theme – Microsoft polished up the extremely popular light theme for Windows, making icons more readable on the light backgound. An easier way to install new fonts – you can now drag & drop font tiles from File Explorer into Settings/Fonts to install them. Improved Start reliability and faster start times. A simplified Start layout – the new default layout features a slick, one column design with reduced top-level tiles. See more entries in… Read more »


The Top 10 Things Every Lawyer Must Know About Computer Forensics

IN THE NEWS – ELIJAH Digest | May 02, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Computer Forensics (often referred to as Digital Forensics) is a branch of forensic science that involves the collection, recovery, and investigation of data found on devices and accounts that store electronic data. Common devices that are the subject of digital forensic analysis include personal computers, laptops, tablets, smart phones, servers, email accounts, social media accounts, web-based storage accounts, wearable technology, and Internet connected devices (Internet of Things), among others. Today, Computer Forensics is used by leading attorneys and is often the key to a successful legal outcome. Every lawyer should know the following: Maintaining a proper Chain of Custody if critical. Maintain a record of how and when each device was collected, as well as the make, model and serial number of each device. “Deleted files” most often times can be recovered. Items… Read more »


Data Breach – Can it really happen to you?

IN THE NEWS – ELIJAH Digest | March 21, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. A data breach can happen to any company, even if they have security systems protecting their network. One of the largest sources of data breaches stems from employee errors – usually employees that do not even realize that what they are doing is hazardous. Recently, an employee at a medium-sized company decided to copy photographs and downloaded documents from his smart phone to his company computer. He attached a USB cable to his computer and connected it to his phone. He copied the photographs and documents to his computer. What the employee didn’t know was that there was a malware infection imbedded in one of the documents that started the process of the data breach for the entire company. The employee did not have any security software on the smartphone. In just the… Read more »


Email Spoofing – Is the email really from the person you think it is from?

IN THE NEWS – ELIJAH Digest | March 7, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. We’ve all received scam emails from strange addresses and fake accounts. By now, these messages are easy to spot. What’s tougher and more worrisome, is email spoofing—defined as when a hacker purposely alters part of an email or email address to make it appear as though it was written and transmitted by someone else. Often, the sender’s account and/or domain name are formatted to appear as if the email is coming from a legitimate source. Cybercriminals can easily create an email address that, upon quick glance looks exactly like yours: president@nnyompany.com instead of president@mycompany.com. Some hackers can even temporarily take over your email domain, sending spam messages from your actual address that you might not notice unless a client or contact points it out to you. The toughest email spoofs to combat are… Read more »


What is Computer Forensics?

IN THE NEWS – ELIJAH Digest | February 21, 2018 On December 1, 2006, the Federal Rules of Civil Procedure was amended to formally allow for electronic data discovery in litigation cases. Computer Forensics is defined as the analysis of computer hard drives (or the analysis of digital media), where the examiner searches for company data, intellectual property, internet history, and can even find hidden files on a hard drive. Additional work may include the investigation of email messages, to verify that they are not tampered with, forged, or deleted. Call logs, documents, are also included. Data recovery from GPS units, phone systems, car computer systems, game consoles, iPods, iPads, Tablets, MP3 players, USB flash drives, SD cards, smartphones. Recovery of data may include missing/deleted ( by now, most people realize that even if you delete a document from your computer, a forensic examiner should be able to recover it)… Read more »


Cybersecurity Managed Services – How Secure Is Your Email From Infection?

IN THE NEWS – ELIJAH Digest | February 7, 2019 How often do you visit the Web – not just opening a web browser and surfing to your favorite website, but using your email as well? In 2018, less than 5% of all email is managed by an Exchange Server, which means that 95% of all email relies on the internet. Internet mail is defined as opening up a web browser or an Outlook client to access your email. This can include mail from the following sources, as an example: Gmail.com Yahoo.com Sbcglobal.net Comcast.net Outlook.com The question becomes – how secure is your mail? Is there a mail service that is blocking your mail from hackers or from infections? Probably not, unless you are using software specifically for this purpose. One of the software products that can be used for this purpose is Advanced Threat Protection. This software, offered by… Read more »


Internet of Things set for growth in 2019?

IN THE NEWS – ELIJAH Digest | January 10, 2019 January is an important month in technology history: the opening of the first underground railway service in London in 1863; in 1927, the first commercial transatlantic phone service was made available; the ordering of the development of a space shuttle program by President Nixon in 1972; and the unveiling of Mac OS X in 2000. In January 2019, the Internet of Things seems poised to really take off (“IoT”). IoT, as defined by Wikipedia, “is the network of devices such as vehicles and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data. Embedded with technology, these devices can communicate and interact over the Internet, and they can be remotely monitored and controlled.” The most common IoT device is your Smartphone. Other examples include wireless thermostats, doorbell cameras, smart watches, Amazon… Read more »


Data & Email Management

IN THE NEWS – ELIJAH Digest | December 13, 2018 How do you communicate with your co-workers and clients that you will be out of the office? Do you take the same care in drafting your out-of-office message that you do with drafting your emails? Here are some of the messages that we have recently received from clients that are out on vacation or traveling for business: “I am out of the office on vacation. Thanks, (name)” “I am out until the 20th.” “I am out of the office with limited access to email and voicemail. My response may be delayed.” “Thank you for your email. I am currently out of the office.” “I am out of the office. I will respond to you upon my return. Thanks.” While it is clear that the person is out of the office, there is not much more being conveyed. For example, items… Read more »