Category: Newsletters

Are your employees helping hackers and hurting your Cybersecurity efforts?

IN THE NEWS – ELIJAH Digest | October 17, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Most of your employees know better than to send a password via email or open a strange document from someone they don’t know. They are careful about what is posted, or at least they think so. In a recent review of Facebook posts of individuals posting photographs while they are at work, about 20% of the photographs show an ID Badge or include details about the software that they use, in their social media posting. Do you remember the Ice Bucket Challenge of a few years ago? In a significant number of those posts, you could see the layout of the office, programs running on the computers, emails on screens, confidential data in documents, login credentials, and more. Below are some helpful tips to help you and your employees improve your Data and… Read more »


Cybersecurity – Now It’s Getting More Personal

IN THE NEWS – ELIJAH Digest | October 03, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. More and more people are getting emails addressed to them, from an executive level member of the company, asking for help. The emails are friendly and simple, but require the recipient to either reply to the message or open an attachment. For example, one of our clients recently had her email account hacked. She was unaware that she was sending messages to her staff, asking for help. The wording of the message was: From: (Company Boss) Sent: Tuesday, September 17, 2019 7:08 AM To: (Company Employee) Subject: I will need your help today. Quick response needed: I want you to handle something for me this morning before heading in. Thanks. Phishing attacks like this, in which carefully targeted digital messages are transmitted to fool people into following directions or clicking on a link,… Read more »


Better Cybersecurity – Phishing Scams You Need To Be Aware Of

IN THE NEWS – ELIJAH Digest | September 19, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Phishing is a type of cybercrime in which hackers contact you while posing as a legitimate institution or organization in an attempt to get you to provide sensitive or private information. Phishing can occur over the telephone, via a SMS text message, or through email. Spoofing is the practice of creating a website or email template that nearly perfectly mimics a legitimate website. Oftentimes, the website design will be very similar but the URL will be slightly off. See an example below: The Most Common Phishing Scams of 2019 Include: Government emails. Emails designed to look like they are from the FBI, IRS, or Medicare or other government agencies are designed to trick you to give away your personal information. Common scams tell you that you are under investigation for “downloading illegal files”… Read more »


Data Breaches & Costs

IN THE NEWS – ELIJAH Digest | September 5, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. The average cost of a data breach is now over $3.5 million. The average time to identify and contain a data breach averages over 8 months. If your business is impacted by a data breach, you can expect over 2/3 of the costs to occur in the first year. These number are up 12% over the past 5 years. The U.S. Security and Exchange Commission estimates that half of all small businesses that suffer a cyber-attack go out of business within six months. Tips on how to protect yourself and your businesses Educate your staff – it is important to teach your staff on what is safe to click on and what is unsafe. Human error was found to have caused over 22% of the breaches. Secure your network infrastructure with a Firewall.… Read more »


ELIJAH Receives Top National Honors for Digital Forensics and Legal Technology

ELIJAH has been recognized by numerous organizations in 2019 for its outstanding work in digital forensics, eDiscovery, and legal technology. Recognitions in the digital forensics industry included “US Digital Forensics & Expert Testimony Consultancy of the Year” (ACQ5 Global Awards), “Computer Forensic Investigations Provider of the Year” (M&A Today Global Awards), and “Best for Computer Forensics & Expert Testimony Services – USA” (Lawyer International Legal 100). In the eDiscovery field, the ACQ5 Global Awards recognized ELIJAH as “US – E-Discovery Company of the Year”, and the 2019 Corporate USA Today Annual Awards recognized ELIJAH as “Technology Solutions Provider of the Year (Legal) – USA”. “ELIJAH has an amazing group of talented digital forensic examiners and legal technologists on our team, who embody our ‘Better Evidence, Clearly’ motto, said ELIJAH CEO Andy Reisman. “Although we are excited to have our efforts recognized, our primary motivation always will be on meeting exacting… Read more »


Smartphones & Cybersecurity – Are you at risk?

IN THE NEWS – ELIJAH Digest | August 22, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Mobile device security threats are on the rise. In 2014, Kaspersky Lab detected almost 3.5 million pieces of malware on more than 1 million user devices. It is estimated that 3 out of every 4 mobile devices are unprotected and contain malware. Cell phones can store large amounts of data that typically includes passwords, credit card numbers, and other personal information. Thus, the cybersecurity risks are high. Top Risks Include: Unsecured Wi-Fi – no one wants to burn through their cellular data when FREE wi-fi is available, but how secure is the Free Wi-Fi? Very Unsecured. It is designed as a Guest network. Some Guest networks require a password, but there is no security. You are better to use your phone as a hot-spot, or use a VPN for better security. Network Spoofing… Read more »


Do You Need Cyber Liability Insurance?

IN THE NEWS – ELIJAH Digest | August 07, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. What is it? Cyber-insurance is a relatively new insurance product and is used to protect law firms and businesses from Internet-based risks. Most policies cover a business’ liability for a data breach in which the firm’s data and information is exposed or stolen. Does my firm or business need it? With more and more law firms and businesses having cyber-attacks, business owners need to consider adding a Cyber Liability Insurance policy to their insurance package. Cyber Liability Insurance is designed to cover the financial losses that result from data breaches and other cyber events. Many policies include both first-party and third-party coverages. First-party applies to losses sustained by your company directly and third-party coverages applies to claims against your firm by people who have been injured a result of your actions or failure… Read more »


Ransomware – How Concerned Should You Really Be?

IN THE NEWS – ELIJAH Digest | July 25, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Today, one of the more difficult situations that a business or municipality can face, is a cybersecurity attack whereby business data is attacked and held hostage for money by a cybercriminal. This is commonly known as Ransomware and the motive is typically monetary with payment demands usually made in Bitcoin. According to a report from the Federal Emergency Management Agency (FEMA), 40% of businesses do not reopen after a Ransomware attack and another 25% of businesses fail with one year. In 2018, Ransomware attackers cost the world more than $8 billion and industry analysts predict that the costs for 2019 will exceed $15 billion. That estimate does not include the costs to fix and repair any IT related issues – which is estimated to be an additional $75 billion for 2019. With the… Read more »


Airport USB charging stations – Are they safe from Data Theft?

IN THE NEWS – ELIJAH Digest | June 27, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. It turns out that those USB charging stations at airports are almost as dangerous as a public wi-fi connection. As IBM Security’s Caleb Barlow recently said, “Plugging into a public USB port is kind of like finding a toothbrush on the side of the road and deciding to stick it in your mouth. You have no idea where that thing has been.” The threat is real. Hackers can easily configure those public USB chargers to deliver dangerous malware to your mobile device. Or, they can install bugs that download data off your smartphone without any warning. Either way, one simple plug into one simple charging station can put your data at risk and if you are using a work device, that risk can spread to your entire company network. According to the 2019… Read more »


Cybersecurity Alert – Google Calendar

IN THE NEWS – ELIJAH Digest | June 27, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. In recent weeks, scammers have developed a new method of luring Google users into getting hacked without their knowledge. This is the Google Calendar notification scam that targets those individuals that use the Google calendar to accept an invitation. The invitation looks normal, but usually contains a link to accept the invitation. Some recent invitations have led users to an illicit website looking to steal personal information. If the link in any document (email or calendar invitation) asks you to log into any account, this may be an indication of a fraudulent link. The recent attack, asked people to log into a website to verify the appointment, leading to credential stealing sites. In the calendar invitation, the scammers can set the number of reminders to deliver the same message until the desired link… Read more »