Troy Babbs

Troy Babbs
Find me on:

Recent Posts

Zero Trust and Cybersecurity

Posted by Troy Babbs on Sep 16, 2021 9:00:00 AM

 

In the cybersecurity realm, "zero trust" refers to not trusting devices attached to company networks/VPN's, as cyberattacks could still occur. Safety and security can always be improved in some capacity, but is this the correct way to look at things? Find out more here!

Regardless of your network/VPN setup, ELIJAH can help install that trust in your company security. Reach out today for more information.

Read More

Topics: Blog

Cybersecurity in a 5G World

Posted by Troy Babbs on Sep 14, 2021 9:00:00 AM

5G is the next generation of mobile networks designed for higher speeds, more reliability, wider accessibility, and improved efficiency. This does not mean that the 5G network is impervious to cyberattacks. Learn more about potential threats to your devices here.

ELIJAH already has the tools in place to help protect and salvage your 5G devices so contact one of our experts today for further information!

Read More

Topics: Blog

The Ramifications of Paying Ransomware Demands

Posted by Troy Babbs on Jun 29, 2021 11:44:16 AM

In the wake of current ransomware attacks, companies might think that paying said ransom is the wisest choice. However, by meeting these demands, businesses and individuals set a dangerous precedent that can lead to higher ransom requests on a more frequent schedule. Find out the best way to handle hacker ultimatums here.

Read More

Topics: Blog

Digital Forensics - Data Loss Detection

Posted by Troy Babbs on Apr 22, 2021 10:00:00 AM

Many organizations expend tremendous resources keeping hackers from accessing corporate networks, but sometimes the greater risk to your information security comes from your own employees who already have full access. This could come in the form of outright theft or fraud, or even from simple inattentiveness. Engaging in appropriate data loss detection strategies could be the key to securing critical company data and minimizing the risk of undetected misuse of organizational data.

Read More

Topics: Blog

eDiscovery - Early Case Assessments

Posted by Troy Babbs on Feb 25, 2021 12:51:55 PM

So you’re potentially dealing with a legal matter that may result in court action. Odds are that you’ll need access to and recovery of key documents, electronically stored information, and other essential evidence. It can be a daunting task to wade through gigabytes, or even terabytes, of information in efforts to obtain relevant results.

Read More

Topics: Blog

Digital Forensics and eDiscovery - Bankruptcy

Posted by Troy Babbs on Jan 15, 2021 1:00:00 PM

Navigating through bankruptcy can be a daunting prospect for receivers, debtors, and creditors. According to S&P Global, as of December 2020, there have been 610 corporate Chapter 11 bankruptcy filings, the highest rate since 2012, and court activity is expected to accelerate as courts clear their pandemic backlogs.

Read More

Topics: Blog

Mobile Device Digital Forensics Case Study: Distracted Driving

Posted by Troy Babbs on Dec 10, 2020 9:00:00 AM

Many people are unaware that their phones store a wealth of information about their daily lives. Extending far beyond text messages and voicemails, this information often is a treasure trove for skilled digital forensic examiners.

Read More

Topics: Blog

Updates for Family Law Practitioners

Posted by Troy Babbs on Nov 12, 2020 11:00:00 AM

Most people don’t think of family law as a high technology practice area, but practitioners routinely encounter issues that necessitate digital forensics, eDiscovery, cybersecurity, and IT expertise. Here is a sampling of how such issues can arise in family law practices:

Read More

Topics: Blog

Video Conferencing Challenges

Posted by Troy Babbs on Oct 15, 2020 10:00:00 AM

Organizations increasingly are relying on video conferencing platforms to conduct daily business affairs. Did you realize that many of these platforms save recordings, including potentially on individual employees’ computers or in the cloud? For example, Zoom is a widely used video conferencing tool, and recordings can be saved either online with Zoom, or locally on a PC. (In Windows, the default location is C:\Users\[Profile Name]\Documents\Zoom.) 

Read More

Topics: Blog

Is Your Company’s Data Properly Protected When Working From Home?

Posted by Troy Babbs on Aug 20, 2020 9:00:00 AM

Six months ago, for many, working from home was a perk. Today, remote work often is a necessity. Many companies have learned that they can thrive with a smaller office footprint, and the trend toward remote workforces likely will continue after COVID-19 is a distant memory.

Read More

Topics: Blog

ELIJAH AWARDS

SIGN UP FOR THE ELIJAH NEWSLETTER