Category: News

Mobile Device Digital Forensics – Recovery of Digital Evidence

IN THE NEWS – ELIJAH Digest | October 31, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Mobile devices have become an important part of people’s daily lives. As such, they are prone to facilitating criminal activity or may otherwise be involved when crimes occur. The crime may not be caused by the owner of the device, but may capture information about the crime (i.e. photos, text messages, etc.) itself. In the field of Digital Forensics, which includes many types of devices in addition to just computers, it is important to recognize the process of retrieving information needed for the legal process. Mobile device forensics obtains digital evidence from mobile devices for an investigation. Mobile devices can include smartphones, PDA devices, GPS devices, and tablet computers. There is a growing need for mobile device forensics as these devices can store and transmit both personal and corporate information and can be… Read more »


Cybersecurity – How Good Are Your Data Backups?

IN THE NEWS – ELIJAH Digest | October 31, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Data backups are an important way to allow your business to continue running should a data interruption occur. With the rise of Cyber and Ransomware attacks, your company’s data backups are more necessary than ever. On October 4th, the FBI released an alert about the increase in Ransomware attacks against SMB’s in all sectors, including healthcare, state, local governments, and businesses of all size. Data Backup Recommendations: Use Off-site backups. Gone are the days of backing up your data to a flash drive or external hard drive that are attached to your server. If attacked by an infection, all of the local computers/servers/external drives will be affected as well. Local and Off-site backups are needed to protect your data. Use a Data Center. A data center is a facility that centralizes an organization’s… Read more »


Cybersecurity – Now It’s Getting More Personal

IN THE NEWS – ELIJAH Digest | October 03, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. More and more people are getting emails addressed to them, from an executive level member of the company, asking for help. The emails are friendly and simple, but require the recipient to either reply to the message or open an attachment. For example, one of our clients recently had her email account hacked. She was unaware that she was sending messages to her staff, asking for help. The wording of the message was: From: (Company Boss) Sent: Tuesday, September 17, 2019 7:08 AM To: (Company Employee) Subject: I will need your help today. Quick response needed: I want you to handle something for me this morning before heading in. Thanks. Phishing attacks like this, in which carefully targeted digital messages are transmitted to fool people into following directions or clicking on a link,… Read more »


Better Cybersecurity – Phishing Scams You Need To Be Aware Of

IN THE NEWS – ELIJAH Digest | September 19, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Phishing is a type of cybercrime in which hackers contact you while posing as a legitimate institution or organization in an attempt to get you to provide sensitive or private information. Phishing can occur over the telephone, via a SMS text message, or through email. Spoofing is the practice of creating a website or email template that nearly perfectly mimics a legitimate website. Oftentimes, the website design will be very similar but the URL will be slightly off. See an example below: The Most Common Phishing Scams of 2019 Include: Government emails. Emails designed to look like they are from the FBI, IRS, or Medicare or other government agencies are designed to trick you to give away your personal information. Common scams tell you that you are under investigation for “downloading illegal files”… Read more »


Data Breaches & Costs

IN THE NEWS – ELIJAH Digest | September 5, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. The average cost of a data breach is now over $3.5 million. The average time to identify and contain a data breach averages over 8 months. If your business is impacted by a data breach, you can expect over 2/3 of the costs to occur in the first year. These number are up 12% over the past 5 years. The U.S. Security and Exchange Commission estimates that half of all small businesses that suffer a cyber-attack go out of business within six months. Tips on how to protect yourself and your businesses Educate your staff – it is important to teach your staff on what is safe to click on and what is unsafe. Human error was found to have caused over 22% of the breaches. Secure your network infrastructure with a Firewall.… Read more »


ELIJAH Receives Top National Honors for Digital Forensics and Legal Technology

ELIJAH has been recognized by numerous organizations in 2019 for its outstanding work in digital forensics, eDiscovery, and legal technology. Recognitions in the digital forensics industry included “US Digital Forensics & Expert Testimony Consultancy of the Year” (ACQ5 Global Awards), “Computer Forensic Investigations Provider of the Year” (M&A Today Global Awards), and “Best for Computer Forensics & Expert Testimony Services – USA” (Lawyer International Legal 100). In the eDiscovery field, the ACQ5 Global Awards recognized ELIJAH as “US – E-Discovery Company of the Year”, and the 2019 Corporate USA Today Annual Awards recognized ELIJAH as “Technology Solutions Provider of the Year (Legal) – USA”. “ELIJAH has an amazing group of talented digital forensic examiners and legal technologists on our team, who embody our ‘Better Evidence, Clearly’ motto, said ELIJAH CEO Andy Reisman. “Although we are excited to have our efforts recognized, our primary motivation always will be on meeting exacting… Read more »


Smartphones & Cybersecurity – Are you at risk?

IN THE NEWS – ELIJAH Digest | August 22, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Mobile device security threats are on the rise. In 2014, Kaspersky Lab detected almost 3.5 million pieces of malware on more than 1 million user devices. It is estimated that 3 out of every 4 mobile devices are unprotected and contain malware. Cell phones can store large amounts of data that typically includes passwords, credit card numbers, and other personal information. Thus, the cybersecurity risks are high. Top Risks Include: Unsecured Wi-Fi – no one wants to burn through their cellular data when FREE wi-fi is available, but how secure is the Free Wi-Fi? Very Unsecured. It is designed as a Guest network. Some Guest networks require a password, but there is no security. You are better to use your phone as a hot-spot, or use a VPN for better security. Network Spoofing… Read more »


Do You Need Cyber Liability Insurance?

IN THE NEWS – ELIJAH Digest | August 07, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. What is it? Cyber-insurance is a relatively new insurance product and is used to protect law firms and businesses from Internet-based risks. Most policies cover a business’ liability for a data breach in which the firm’s data and information is exposed or stolen. Does my firm or business need it? With more and more law firms and businesses having cyber-attacks, business owners need to consider adding a Cyber Liability Insurance policy to their insurance package. Cyber Liability Insurance is designed to cover the financial losses that result from data breaches and other cyber events. Many policies include both first-party and third-party coverages. First-party applies to losses sustained by your company directly and third-party coverages applies to claims against your firm by people who have been injured a result of your actions or failure… Read more »


Ransomware – How Concerned Should You Really Be?

IN THE NEWS – ELIJAH Digest | July 25, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Today, one of the more difficult situations that a business or municipality can face, is a cybersecurity attack whereby business data is attacked and held hostage for money by a cybercriminal. This is commonly known as Ransomware and the motive is typically monetary with payment demands usually made in Bitcoin. According to a report from the Federal Emergency Management Agency (FEMA), 40% of businesses do not reopen after a Ransomware attack and another 25% of businesses fail with one year. In 2018, Ransomware attackers cost the world more than $8 billion and industry analysts predict that the costs for 2019 will exceed $15 billion. That estimate does not include the costs to fix and repair any IT related issues – which is estimated to be an additional $75 billion for 2019. With the… Read more »


Airport USB charging stations – Are they safe from Data Theft?

IN THE NEWS – ELIJAH Digest | June 27, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. It turns out that those USB charging stations at airports are almost as dangerous as a public wi-fi connection. As IBM Security’s Caleb Barlow recently said, “Plugging into a public USB port is kind of like finding a toothbrush on the side of the road and deciding to stick it in your mouth. You have no idea where that thing has been.” The threat is real. Hackers can easily configure those public USB chargers to deliver dangerous malware to your mobile device. Or, they can install bugs that download data off your smartphone without any warning. Either way, one simple plug into one simple charging station can put your data at risk and if you are using a work device, that risk can spread to your entire company network. According to the 2019… Read more »