The Ramifications of Paying Ransomware Demands

Posted by Troy Babbs on Jun 29, 2021 11:44:16 AM

In the wake of current ransomware attacks, companies might think that paying said ransom is the wisest choice. However, by meeting these demands, businesses and individuals set a dangerous precedent that can lead to higher ransom requests on a more frequent schedule. Find out the best way to handle hacker ultimatums here.

Read More

Topics: Blog

ELIJAH CEO Andy Reisman Becomes First AndyCoin Billionaire

Posted by Andy Reisman on May 13, 2021 9:50:12 AM

Miami, FL May 13, 2021: ELIJAH CEO Andy Reisman has become the first AndyCoin billionaire, leading a new revolution in environmentally sustainable cryptocurrency. AndyCoin eliminates the need for computer mining practices that unnecessarily contribute to climate change. Rather, in its initial release, AndyCoin is powered by a single Excel 2003 xls spreadsheet, managed by Reisman. "Trust and environmental stewardship should be the bedrock of today's leading cryptocurrencies, and I can't think of anyone more trustworthy than me to manage AndyCoin," said Reisman. "By having the entire ecosystem run on a single desktop computer, AndyCoin is over 99.99999% more efficient than Bitcoin, and using Excel 2003 allows 65,534 other AndyCoin pioneers to join me, after factoring in the top row and my own entry." Reisman currently controls 25% of the 1 trillion available AndyCoin market, with an estimated value of 250 billion U.S. dollars, once others realize the value in accepting it. "At $1 per AndyCoin, this represents an absolute bargain compared to the price of Bitcoin," boasted Reisman. Anyone interested in purchasing AndyCoin should contact Reisman at andy.reisman@elijaht.com. "Now is the time," said Reisman, "before we launch our upgraded Excel 2007 based platform, which will open the door to a million more savvy investors."

Read More

Topics: Blog

Colonial Pipeline Ransomware Attack - What it Means for You

Posted by Andy Reisman on May 10, 2021 4:30:06 PM

On May 8, 2021, the world learned that Colonial Pipeline was the victim of a ransomware cyber attack. Colonial Pipeline is the operator of the largest gasoline pipeline in the United States. A ransomware attack locks out users of computers and/or computer networks by encrypting data, holding it hostage until the victim pays a fee, typically in cryptocurrency. in some ransomware attacks, upon payment of the ransom the attacker provides the decryption key so normal operations can resume, while in others the attacker has no intention of restoring full access.

Read More

Topics: Blog

Digital Forensics - Data Loss Detection

Posted by Troy Babbs on Apr 22, 2021 10:00:00 AM

Many organizations expend tremendous resources keeping hackers from accessing corporate networks, but sometimes the greater risk to your information security comes from your own employees who already have full access. This could come in the form of outright theft or fraud, or even from simple inattentiveness. Engaging in appropriate data loss detection strategies could be the key to securing critical company data and minimizing the risk of undetected misuse of organizational data.

Read More

Topics: Blog

eDiscovery - Early Case Assessments

Posted by Troy Babbs on Feb 25, 2021 12:51:55 PM

So you’re potentially dealing with a legal matter that may result in court action. Odds are that you’ll need access to and recovery of key documents, electronically stored information, and other essential evidence. It can be a daunting task to wade through gigabytes, or even terabytes, of information in efforts to obtain relevant results.

Read More

Topics: Blog

Digital Forensics and eDiscovery - Bankruptcy

Posted by Troy Babbs on Jan 15, 2021 1:00:00 PM

Navigating through bankruptcy can be a daunting prospect for receivers, debtors, and creditors. According to S&P Global, as of December 2020, there have been 610 corporate Chapter 11 bankruptcy filings, the highest rate since 2012, and court activity is expected to accelerate as courts clear their pandemic backlogs.

Read More

Topics: Blog

Mobile Device Digital Forensics Case Study: Distracted Driving

Posted by Troy Babbs on Dec 10, 2020 9:00:00 AM

Many people are unaware that their phones store a wealth of information about their daily lives. Extending far beyond text messages and voicemails, this information often is a treasure trove for skilled digital forensic examiners.

Read More

Topics: Blog

Updates for Family Law Practitioners

Posted by Troy Babbs on Nov 12, 2020 11:00:00 AM

Most people don’t think of family law as a high technology practice area, but practitioners routinely encounter issues that necessitate digital forensics, eDiscovery, cybersecurity, and IT expertise. Here is a sampling of how such issues can arise in family law practices:

Read More

Topics: Blog

Video Conferencing Challenges

Posted by Troy Babbs on Oct 15, 2020 10:00:00 AM

Organizations increasingly are relying on video conferencing platforms to conduct daily business affairs. Did you realize that many of these platforms save recordings, including potentially on individual employees’ computers or in the cloud? For example, Zoom is a widely used video conferencing tool, and recordings can be saved either online with Zoom, or locally on a PC. (In Windows, the default location is C:\Users\[Profile Name]\Documents\Zoom.) 

Read More

Topics: Blog

Is Your Company’s Data Properly Protected When Working From Home?

Posted by Troy Babbs on Aug 20, 2020 9:00:00 AM

Six months ago, for many, working from home was a perk. Today, remote work often is a necessity. Many companies have learned that they can thrive with a smaller office footprint, and the trend toward remote workforces likely will continue after COVID-19 is a distant memory.

Read More

Topics: Blog

ELIJAH AWARDS

SIGN UP FOR THE ELIJAH NEWSLETTER