Blog

Cyber is a Corporate Risk!

Cyber is a Corporate Risk!

Cybersecurity centers around the use of technology, but it is not an issue that can be addressed solely by a company's Information Technology (IT) department. The potential impact of a cyber incident is too significant and requires leadership and awareness from the...

read more
Cybersecurity is NOT an IT problem!

Cybersecurity is NOT an IT problem!

When discussing Cybersecurity, often a firm executive will say, "Oh, we have an IT person/ department/ firm who handles that, and they're really good." Information Technology and Cybersecurity both deal with technology, but they are not the same and require different...

read more
Hackers have scammed you! Now What?

Hackers have scammed you! Now What?

Last month’s newsletter discussed measures a firm could take to prevent Business Email Compromise (BEC). BEC is where criminals spoof emails to appear as if they are coming from senior management within the company. Cybercriminals will often use this scheme to fool...

read more
Don’t Let Hackers Steal Your Money!

Don’t Let Hackers Steal Your Money!

The examples are everywhere: A law firm is tricked into wiring $800,000 into a fraudulent account, and the partners are forced to cover the loss out of their own pockets. A trucking company recently lost $750,000 in the same manner and scrambled to find help to...

read more
How Leaders Can Foster a Culture of Innovation

How Leaders Can Foster a Culture of Innovation

Throughout private industry and government, employees and managers are constantly being exhorted to be innovative. We set up innovation teams, labs, and contests to encourage employees to do more with technology. They are told "Be Innovative!" and create the next...

read more
The Importance of Keeping Security Controls Up to Date

The Importance of Keeping Security Controls Up to Date

Today I am visiting the DMV for the second time in my quest to exchange my out-of-state license for a Texas driver's license. Like many others, I didn't have all the required documentation with me during the first visit. Part of Texas' licensing process is to verify...

read more
Computer Forensics vs. Phone Forensics

Computer Forensics vs. Phone Forensics

What is Computer Forensics? Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. Computer forensics aims to examine digital media soundly to identify, preserve, recover, analyze, and present...

read more
What is Computer Forensics?

What is Computer Forensics?

Technology is a daily part of our lives, making it more convenient. For the investigator, technology presents challenges as well as opportunities. Not only does a good computer forensics investigator need to have a pedigree of technical savvy in terms of...

read more
Mergers and Acquisitions (M&A) Due Diligence

Mergers and Acquisitions (M&A) Due Diligence

What is due diligence? The due diligence process allows potential buyers and investors to learn about the company in question with a signed full disclosure. The information requires precision and investigation for structuring a fair deal for all involved stakeholders....

read more