Category: Newsletters

Smartphones & Cybersecurity – Are you at risk?

IN THE NEWS – ELIJAH Digest | August 22, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Mobile device security threats are on the rise. In 2014, Kaspersky Lab detected almost 3.5 million pieces of malware on more than 1 million user devices. It is estimated that 3 out of every 4 mobile devices are unprotected and contain malware. Cell phones can store large amounts of data that typically includes passwords, credit card numbers, and other personal information. Thus, the cybersecurity risks are high. Top Risks Include: Unsecured Wi-Fi – no one wants to burn through their cellular data when FREE wi-fi is available, but how secure is the Free Wi-Fi? Very Unsecured. It is designed as a Guest network. Some Guest networks require a password, but there is no security. You are better to use your phone as a hot-spot, or use a VPN for better security. Network Spoofing… Read more »


Do You Need Cyber Liability Insurance?

IN THE NEWS – ELIJAH Digest | August 07, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. What is it? Cyber-insurance is a relatively new insurance product and is used to protect law firms and businesses from Internet-based risks. Most policies cover a business’ liability for a data breach in which the firm’s data and information is exposed or stolen. Does my firm or business need it? With more and more law firms and businesses having cyber-attacks, business owners need to consider adding a Cyber Liability Insurance policy to their insurance package. Cyber Liability Insurance is designed to cover the financial losses that result from data breaches and other cyber events. Many policies include both first-party and third-party coverages. First-party applies to losses sustained by your company directly and third-party coverages applies to claims against your firm by people who have been injured a result of your actions or failure… Read more »


Ransomware – How Concerned Should You Really Be?

IN THE NEWS – ELIJAH Digest | July 25, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Today, one of the more difficult situations that a business or municipality can face, is a cybersecurity attack whereby business data is attacked and held hostage for money by a cybercriminal. This is commonly known as Ransomware and the motive is typically monetary with payment demands usually made in Bitcoin. According to a report from the Federal Emergency Management Agency (FEMA), 40% of businesses do not reopen after a Ransomware attack and another 25% of businesses fail with one year. In 2018, Ransomware attackers cost the world more than $8 billion and industry analysts predict that the costs for 2019 will exceed $15 billion. That estimate does not include the costs to fix and repair any IT related issues – which is estimated to be an additional $75 billion for 2019. With the… Read more »


Airport USB charging stations – Are they safe from Data Theft?

IN THE NEWS – ELIJAH Digest | June 27, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. It turns out that those USB charging stations at airports are almost as dangerous as a public wi-fi connection. As IBM Security’s Caleb Barlow recently said, “Plugging into a public USB port is kind of like finding a toothbrush on the side of the road and deciding to stick it in your mouth. You have no idea where that thing has been.” The threat is real. Hackers can easily configure those public USB chargers to deliver dangerous malware to your mobile device. Or, they can install bugs that download data off your smartphone without any warning. Either way, one simple plug into one simple charging station can put your data at risk and if you are using a work device, that risk can spread to your entire company network. According to the 2019… Read more »


Cybersecurity Alert – Google Calendar

IN THE NEWS – ELIJAH Digest | June 27, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. In recent weeks, scammers have developed a new method of luring Google users into getting hacked without their knowledge. This is the Google Calendar notification scam that targets those individuals that use the Google calendar to accept an invitation. The invitation looks normal, but usually contains a link to accept the invitation. Some recent invitations have led users to an illicit website looking to steal personal information. If the link in any document (email or calendar invitation) asks you to log into any account, this may be an indication of a fraudulent link. The recent attack, asked people to log into a website to verify the appointment, leading to credential stealing sites. In the calendar invitation, the scammers can set the number of reminders to deliver the same message until the desired link… Read more »


Cybersecurity – NSA Advisory To All Windows Users

IN THE NEWS – ELIJAH Digest | June 13, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. On June 4, 2019, the National Security Agency (NSA) sent out a Cybersecurity Advisory to urge Microsoft Windows users and administrators to ensure that they are using a patched and updated system in the face of growing threats. There is a flaw in the Windows operating system that could cause widespread havoc without user intervention. The flaw is called “BlueKeep,” and is the type of vulnerability that malicious cyber attackers could exploit through the use of software code that specifically targets the vulnerability. This software could be in the form of a virus, malware, or ransomware – and it could happen by simply having the computer turned on. The NSA urges everyone to invest the time and resources to know your network and run supported operating systems with the latest patches. Updating systems… Read more »


Beware Of Vishing – A New Type Of Fraud

IN THE NEWS – ELIJAH Digest | May 30, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. There’s a new scheme in town, and it is called “Vishing”. Vishing is a type of fraud that attempts to access private information via phone calls and voice messages. These have become more frequent as the quantity of robocalls continue to increase. “Vishers” – the bad guys doing the vishing – often claim to need financial data to clear up an IRS matter, or needing birthdates or social security numbers to unfreeze bank accounts, or your address to restart a utility service. Vishers are sometimes just looking to make a copy of your voice, saying the word “Yes” or “I agree”. Vishers often get information about you from social media, such as: Facebook, Linked-In, and/or Twitter to create a sense of trust or familiarity. Vishers also often use “neighborhood spoofing,” in which the… Read more »


Have You Seen The New Windows 10 Update (19H1)?

IN THE NEWS – ELIJAH Digest | May 16, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Microsoft is rolling out an update for May that has several changes – some good and some more restrictive. This is the May Update for Windows. The good news is that several of the features are improving to make your work easier. The top new features include: Project your Android phone screen on your PC. An even better light theme – Microsoft polished up the extremely popular light theme for Windows, making icons more readable on the light backgound. An easier way to install new fonts – you can now drag & drop font tiles from File Explorer into Settings/Fonts to install them. Improved Start reliability and faster start times. A simplified Start layout – the new default layout features a slick, one column design with reduced top-level tiles. See more entries in… Read more »


The Top 10 Things Every Lawyer Must Know About Computer Forensics

IN THE NEWS – ELIJAH Digest | May 02, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Computer Forensics (often referred to as Digital Forensics) is a branch of forensic science that involves the collection, recovery, and investigation of data found on devices and accounts that store electronic data. Common devices that are the subject of digital forensic analysis include personal computers, laptops, tablets, smart phones, servers, email accounts, social media accounts, web-based storage accounts, wearable technology, and Internet connected devices (Internet of Things), among others. Today, Computer Forensics is used by leading attorneys and is often the key to a successful legal outcome. Every lawyer should know the following: Maintaining a proper Chain of Custody if critical. Maintain a record of how and when each device was collected, as well as the make, model and serial number of each device. “Deleted files” most often times can be recovered. Items… Read more »


Robocalls – Are they Legal?

IN THE NEWS – ELIJAH Digest | April 18, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. A Robocall is an automated telephone call which delivers a recorded message (as if from a robot), typically on behalf of a political party or telemarketing company. In 2017, 5% of all cell phone calls were robocalls. In 2018 the number rose to 30%. In 2019, the number is expected to rise to 50% and have a major impact on data and cybersecurity. So, are these legal? The short answer is yes. The Federal Telephone Consumer Protection Act of 1991 allows for the non-commercial robocalls to most residential telephone lines. After receiving more than 215,000 consumer complaints in 2014 alone, the U.S. Federal Communications Commission (FCC) strengthened and clarified its regulations protecting consumers from unwanted robocalls and spam emails and texts. The Commission issued a package of declaratory rulings in June 2015 that… Read more »