Category: News

Cybersecurity – NSA Advisory To All Windows Users

IN THE NEWS – ELIJAH Digest | June 13, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. On June 4, 2019, the National Security Agency (NSA) sent out a Cybersecurity Advisory to urge Microsoft Windows users and administrators to ensure that they are using a patched and updated system in the face of growing threats. There is a flaw in the Windows operating system that could cause widespread havoc without user intervention. The flaw is called “BlueKeep,” and is the type of vulnerability that malicious cyber attackers could exploit through the use of software code that specifically targets the vulnerability. This software could be in the form of a virus, malware, or ransomware – and it could happen by simply having the computer turned on. The NSA urges everyone to invest the time and resources to know your network and run supported operating systems with the latest patches. Updating systems… Read more »


Beware Of Vishing – A New Type Of Fraud

IN THE NEWS – ELIJAH Digest | May 30, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. There’s a new scheme in town, and it is called “Vishing”. Vishing is a type of fraud that attempts to access private information via phone calls and voice messages. These have become more frequent as the quantity of robocalls continue to increase. “Vishers” – the bad guys doing the vishing – often claim to need financial data to clear up an IRS matter, or needing birthdates or social security numbers to unfreeze bank accounts, or your address to restart a utility service. Vishers are sometimes just looking to make a copy of your voice, saying the word “Yes” or “I agree”. Vishers often get information about you from social media, such as: Facebook, Linked-In, and/or Twitter to create a sense of trust or familiarity. Vishers also often use “neighborhood spoofing,” in which the… Read more »


Have You Seen The New Windows 10 Update (19H1)?

IN THE NEWS – ELIJAH Digest | May 16, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Microsoft is rolling out an update for May that has several changes – some good and some more restrictive. This is the May Update for Windows. The good news is that several of the features are improving to make your work easier. The top new features include: Project your Android phone screen on your PC. An even better light theme – Microsoft polished up the extremely popular light theme for Windows, making icons more readable on the light backgound. An easier way to install new fonts – you can now drag & drop font tiles from File Explorer into Settings/Fonts to install them. Improved Start reliability and faster start times. A simplified Start layout – the new default layout features a slick, one column design with reduced top-level tiles. See more entries in… Read more »


The Top 10 Things Every Lawyer Must Know About Computer Forensics

IN THE NEWS – ELIJAH Digest | May 02, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Computer Forensics (often referred to as Digital Forensics) is a branch of forensic science that involves the collection, recovery, and investigation of data found on devices and accounts that store electronic data. Common devices that are the subject of digital forensic analysis include personal computers, laptops, tablets, smart phones, servers, email accounts, social media accounts, web-based storage accounts, wearable technology, and Internet connected devices (Internet of Things), among others. Today, Computer Forensics is used by leading attorneys and is often the key to a successful legal outcome. Every lawyer should know the following: Maintaining a proper Chain of Custody if critical. Maintain a record of how and when each device was collected, as well as the make, model and serial number of each device. “Deleted files” most often times can be recovered. Items… Read more »


Robocalls – Are they Legal?

IN THE NEWS – ELIJAH Digest | April 18, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. A Robocall is an automated telephone call which delivers a recorded message (as if from a robot), typically on behalf of a political party or telemarketing company. In 2017, 5% of all cell phone calls were robocalls. In 2018 the number rose to 30%. In 2019, the number is expected to rise to 50% and have a major impact on data and cybersecurity. So, are these legal? The short answer is yes. The Federal Telephone Consumer Protection Act of 1991 allows for the non-commercial robocalls to most residential telephone lines. After receiving more than 215,000 consumer complaints in 2014 alone, the U.S. Federal Communications Commission (FCC) strengthened and clarified its regulations protecting consumers from unwanted robocalls and spam emails and texts. The Commission issued a package of declaratory rulings in June 2015 that… Read more »


What Are The 3 Key Things You Should Be Doing For Your Company’s Cybersecurity?

IN THE NEWS – ELIJAH Digest | April 04, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. From a one person business to a 10,000+ person business, Cybersecurity applies to companies of all sizes. Not only do all businesses need it, but most businesses need to improve it. Cyber criminals and hackers are getting more creative and aggressive every day, and the average cybersecurity team is struggling to keep ahead. So, what should you do today? Plan All businesses need to develop a plan for a potential cyber-attack. But what works for one business may not work for the next business. One size does not fit all. There are several guidelines that need to be considered before creating a plan. You also need to understand the business, how it works, and where your critical business operations fit into it. Do you need to protect customer data? Or your data? Do… Read more »


Elijah’s Own Jon Isenberg Recognized

Jon Isenberg, Elijah Information Technology’s President, was recently recognized and featured by the Birmingham Bloomfield Chamber of Commerce as their Ambassador of the Week. Jon was honored with the recognition for the final week of March, 2019. You can read more on the LinkedIn page of the Birmingham Bloomfield Chamber at https://www.linkedin.com/feed/update/urn:li:activity:6516305456288329729/.


Data Breach – Can it really happen to you?

IN THE NEWS – ELIJAH Digest | March 21, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. A data breach can happen to any company, even if they have security systems protecting their network. One of the largest sources of data breaches stems from employee errors – usually employees that do not even realize that what they are doing is hazardous. Recently, an employee at a medium-sized company decided to copy photographs and downloaded documents from his smart phone to his company computer. He attached a USB cable to his computer and connected it to his phone. He copied the photographs and documents to his computer. What the employee didn’t know was that there was a malware infection imbedded in one of the documents that started the process of the data breach for the entire company. The employee did not have any security software on the smartphone. In just the… Read more »


Email Spoofing – Is the email really from the person you think it is from?

IN THE NEWS – ELIJAH Digest | March 7, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. We’ve all received scam emails from strange addresses and fake accounts. By now, these messages are easy to spot. What’s tougher and more worrisome, is email spoofing—defined as when a hacker purposely alters part of an email or email address to make it appear as though it was written and transmitted by someone else. Often, the sender’s account and/or domain name are formatted to appear as if the email is coming from a legitimate source. Cybercriminals can easily create an email address that, upon quick glance looks exactly like yours: president@nnyompany.com instead of president@mycompany.com. Some hackers can even temporarily take over your email domain, sending spam messages from your actual address that you might not notice unless a client or contact points it out to you. The toughest email spoofs to combat are… Read more »


What is Computer Forensics?

IN THE NEWS – ELIJAH Digest | February 21, 2018 On December 1, 2006, the Federal Rules of Civil Procedure was amended to formally allow for electronic data discovery in litigation cases. Computer Forensics is defined as the analysis of computer hard drives (or the analysis of digital media), where the examiner searches for company data, intellectual property, internet history, and can even find hidden files on a hard drive. Additional work may include the investigation of email messages, to verify that they are not tampered with, forged, or deleted. Call logs, documents, are also included. Data recovery from GPS units, phone systems, car computer systems, game consoles, iPods, iPads, Tablets, MP3 players, USB flash drives, SD cards, smartphones. Recovery of data may include missing/deleted ( by now, most people realize that even if you delete a document from your computer, a forensic examiner should be able to recover it)… Read more »