Data Breach – Can it really happen to you?

Written by Jon Isenberg on March 21, 2019

IN THE NEWS – ELIJAH Digest | March 21, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. A data breach can happen to any company, even if they have security systems protecting their network. One of the largest sources of data breaches stems from employee errors – usually employees that do not even realize that what they are doing is hazardous. Recently, an employee at a medium-sized company decided to copy photographs and downloaded documents from his smart phone to his company computer. He attached a USB cable to his computer and connected it to his phone. He copied the photographs and documents to his computer. What the employee didn’t know was that there was a malware infection imbedded in one of the documents that started the process of the data breach for the entire company. The employee did not have any security software on the smartphone. In just the… Read more »

Read More

Email Spoofing – Is the email really from the person you think it is from?

Written by Jon Isenberg on March 7, 2019

IN THE NEWS – ELIJAH Digest | March 7, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. We’ve all received scam emails from strange addresses and fake accounts. By now, these messages are easy to spot. What’s tougher and more worrisome, is email spoofing—defined as when a hacker purposely alters part of an email or email address to make it appear as though it was written and transmitted by someone else. Often, the sender’s account and/or domain name are formatted to appear as if the email is coming from a legitimate source. Cybercriminals can easily create an email address that, upon quick glance looks exactly like yours: president@nnyompany.com instead of president@mycompany.com. Some hackers can even temporarily take over your email domain, sending spam messages from your actual address that you might not notice unless a client or contact points it out to you. The toughest email spoofs to combat are… Read more »

Read More

What is Computer Forensics?

Written by Jon Isenberg on February 21, 2019

IN THE NEWS – ELIJAH Digest | February 21, 2018 On December 1, 2006, the Federal Rules of Civil Procedure was amended to formally allow for electronic data discovery in litigation cases. Computer Forensics is defined as the analysis of computer hard drives (or the analysis of digital media), where the examiner searches for company data, intellectual property, internet history, and can even find hidden files on a hard drive. Additional work may include the investigation of email messages, to verify that they are not tampered with, forged, or deleted. Call logs, documents, are also included. Data recovery from GPS units, phone systems, car computer systems, game consoles, iPods, iPads, Tablets, MP3 players, USB flash drives, SD cards, smartphones. Recovery of data may include missing/deleted ( by now, most people realize that even if you delete a document from your computer, a forensic examiner should be able to recover it)… Read more »

Read More