Category: News

Client Update: ELIJAH Coronavirus Precautions (COVID-19)

ELIJAH is remaining operational during the current coronavirus outbreak to provide the expert digital forensics, eDiscovery, cybersecurity, and information technology services on which our clients have come to rely. We value the safety of our clients and employees, and accordingly wanted to update you on recommendations and precautions relating to our services. ELIJAH has the capability to perform the vast majority of our work remotely. This includes the remote digital forensic collections of a wide variety of computers, servers, phones, email accounts, social media accounts, and other data. Although we are continuing in-person forensic collections as well at this time, we encourage our clients to discuss remote imaging alternatives, which are equally forensically sound and are consistent with social distancing. Although no ELIJAH personnel currently have tested positive or exhibited any coronavirus systems, any ELIJAH personnel who have traveled overseas or otherwise been in a high-risk environment will seek medical… Read more »


Cybersecurity Alert – Ransomware That Does More Than Encrypt Your Data

IN THE NEWS – ELIJAH Digest | February 20, 2020 Computer Forensic, Cybersecurity and Managed IT Solutions. There is a new type of Ransomware that is attacking businesses and wreaking havoc on Cybersecurity measures. This new strain called “Ekans” contains not just the encryption software, but also a type of Artificial Intelligence that targets the entire corporate network infrastructure, including servers and virtual machines. This can not only lock your data, but also disable your network. How bad is this? If you thought that losing your data was bad, with Ekans, your entire network will be corrupted, and you may have to replace every device in your server room. Better Cybersecurity – Six Strategies To Be Proactive Rather Than Reactive: Security Software. There are a handful of security software products that offer Ransomware protection that automatically detects if you downloaded a file containing Ransomware. This software will delete the file… Read more »


Cybersecurity and IoT Devices – Are You Protected?

IN THE NEWS – ELIJAH Digest | February 06, 2020 Computer Forensic, Cybersecurity and Managed IT Solutions. IoT or the Internet of Things is bringing every aspect of our lives online. It is projected that the quantity of IoT devices will increase worldwide to over 75 billion in 2025. Phones, watches, thermostats, cameras, refrigerators, printers, and more are connecting to the wireless systems in our homes and offices. Every day a new device comes out – but are they secure? The majority of IoT devices do not have any security solutions built into them and are dependent on the network that they connect to. All IoT devices need to have some type of protection on them as they can be hacked. Seven tips on how to protect yourself and your business. Connect the IoT devices to a secondary network. Most Firewalls and Wi-Fi devices have the ability to create a… Read more »


Cybersecurity Alert: Cyberattacks On The Rise In Early 2020

IN THE NEWS – ELIJAH Digest | January 23, 2020 Computer Forensic, Cybersecurity and Managed IT Solutions. In the past two months, the news has been littered with reports of cyberattacks including attacks on: The Department of Homeland Security, Mitsubishi, and LifeLabs, to name a few. Five Steps to reduce the chance that your business will be a target of a cyberattack: Be careful what you click on. Watch for emails that seem out-of-place, like the email from your boss that asks you to run an errand and pick up gift cards as they are in a meeting. Or, that email that seems too good to be true (it probably is) and contains a ransomware infection. In our busy lives, remember to think before clicking. Use strong security software. Security software should be installed on every device that you use to connect to the internet. Whether accessing email or the… Read more »


Employee Departures – What Are They Really Taking With Them?

IN THE NEWS – ELIJAH Digest | January 9, 2020 Computer Forensic, Cybersecurity and Managed IT Solutions. In a recent study by Biscom, 87% of employees who leave a job take data that they created in that job. Employee Data Theft is now an unfortunate part of running a business today. The top 5 most common types of malicious insiders include: The Careless Worker (misusing assets). Employees or partners who misappropriate resources, break acceptable use policies, mishandle data, install unauthorized applications and use unapproved workarounds. This behavior is often referred to as “Shadow IT” and the actions are deemed inappropriate as opposed to malicious. Inside agents (stealing information on behalf of outsiders). Insiders recruited, solicited or bribed by external parties to exfiltrate data. Disgruntled employees. Insiders who seek to harm their organization via destruction of data or disruption of business activity. Malicious insiders (stealing information for personal gain). Actors with… Read more »


Skype For Business Is Being Retired – Are You Ready?

IN THE NEWS – ELIJAH Digest | December 12, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Microsoft recently announced that in 2021, Microsoft’s Skype for Business will be retired and the service will no longer be available. According to a Microsoft website, Skype for Business customers will be migrated to Microsoft Teams. The Skype consumer service is not affected by this announcement. Why are they doing this? In 2017, Microsoft Teams was launched, as the “hub for teamwork” as part of the Office 365 software. Teams combines chat, video, calling, and document collaboration into a single integrated app and an entirely new way of working. This new upgraded experience will bring more technology and usability than the current Skype for Business product. With the most recent Windows updates, Microsoft Teams will start up every time you restart your computer. You can log in using your email & password, the… Read more »


Mobile Device Digital Forensics – Recovery of Digital Evidence

IN THE NEWS – ELIJAH Digest | November 14, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Mobile devices have become an important part of people’s daily lives. As such, they are prone to facilitating criminal activity or may otherwise be involved when crimes occur. The crime may not be caused by the owner of the device, but may capture information about the crime (i.e. photos, text messages, etc.) itself. In the field of Digital Forensics, which includes many types of devices in addition to just computers, it is important to recognize the process of retrieving information needed for the legal process. Mobile device forensics obtains digital evidence from mobile devices for an investigation. Mobile devices can include smartphones, PDA devices, GPS devices, and tablet computers. There is a growing need for mobile device forensics as these devices can store and transmit both personal and corporate information and can be… Read more »


Cybersecurity – How Good Are Your Data Backups?

IN THE NEWS – ELIJAH Digest | October 31, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Data backups are an important way to allow your business to continue running should a data interruption occur. With the rise of Cyber and Ransomware attacks, your company’s data backups are more necessary than ever. On October 4th, the FBI released an alert about the increase in Ransomware attacks against SMB’s in all sectors, including healthcare, state, local governments, and businesses of all size. Data Backup Recommendations: Use Off-site backups. Gone are the days of backing up your data to a flash drive or external hard drive that are attached to your server. If attacked by an infection, all of the local computers/servers/external drives will be affected as well. Local and Off-site backups are needed to protect your data. Use a Data Center. A data center is a facility that centralizes an organization’s… Read more »


Cybersecurity – Now It’s Getting More Personal

IN THE NEWS – ELIJAH Digest | October 03, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. More and more people are getting emails addressed to them, from an executive level member of the company, asking for help. The emails are friendly and simple, but require the recipient to either reply to the message or open an attachment. For example, one of our clients recently had her email account hacked. She was unaware that she was sending messages to her staff, asking for help. The wording of the message was: From: (Company Boss) Sent: Tuesday, September 17, 2019 7:08 AM To: (Company Employee) Subject: I will need your help today. Quick response needed: I want you to handle something for me this morning before heading in. Thanks. Phishing attacks like this, in which carefully targeted digital messages are transmitted to fool people into following directions or clicking on a link,… Read more »


Better Cybersecurity – Phishing Scams You Need To Be Aware Of

IN THE NEWS – ELIJAH Digest | September 19, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Phishing is a type of cybercrime in which hackers contact you while posing as a legitimate institution or organization in an attempt to get you to provide sensitive or private information. Phishing can occur over the telephone, via a SMS text message, or through email. Spoofing is the practice of creating a website or email template that nearly perfectly mimics a legitimate website. Oftentimes, the website design will be very similar but the URL will be slightly off. See an example below: The Most Common Phishing Scams of 2019 Include: Government emails. Emails designed to look like they are from the FBI, IRS, or Medicare or other government agencies are designed to trick you to give away your personal information. Common scams tell you that you are under investigation for “downloading illegal files”… Read more »