Comment and opinion

How to Write a Simple IT Security Plan for a Small Business

In the last in our series about business security, we’re taking a look at how to write a basic security plan for a small business. It’s one of those business essentials you don’t want to do without, is something far

Posted: 9 January 2017

Business IT Security for Non-Geeks, Part 4

Welcome back. In the second post about the elements in a workable, thorough IT security checklist, we’re looking at checklist items four to seven. IT security checklist item 4 – Internal staff It’s most important that everyone in your organisation

Posted: 4 December 2016

Business IT Security for Non-Geeks, Part 3

Last time we went into detail about systems security, IT systems risk assessment, and the cost of systems problems from a financial and brand reputation perspective. This time, in part three of our in-depth look at business IT security, we’re

Posted: 14 November 2016

Business IT Security for Non-Geeks, Part 2

Last time, in the first post in a series about business IT security, we examined the risks inherent in business IT security from mischief makers, fraudsters, hackers, data thieves, industrial spies, internal risks and system network issues. This time, in

Posted: 20 October 2016

Business IT Security for Non-Geeks, Part 1

Knowledge is power. Once you know what the risks are, you can plan how to mitigate them. This is the first in a short series of posts about business IT security for non-geeks. Today we're looking at the risks you, as a business, face from mischief makers, fraudsters, hackers, data thieves, industrial spies, internal risks and system network issues, and examining the questions you should ask your IT department...

Posted: 10 October 2016

Why Use a Digital Forensic Specialist When You Have an IT Department?

You have your own IT department. There’s some sort of dispute and you need to carry out in-depth, discreet enquiries. Can your own IT people pitch in and gather the necessary evidence? We explore the reasons why it's vital to hand over to a digital forensic specialist

Posted: 22 September 2016

Coping With Disruptive Employees – Essential First Steps

People are people. With the best will in the world, we tend to bring our personalities into work with us. And sometimes that means 'acting out' in all sorts of dysfunctional ways, whether it's bullying fellow employees, sending unpleasant anonymous emails or bad-mouthing the business in general. The results can be devastating. Disruptive staff can damage morale, split workers into factions and make people very unhappy at work. Problem employees can even have a dramatic affect on your bottom line, infecting co-workers, demoralising teams and resulting in increasing amounts of time 'off sick' thanks to the stress of it all.

Posted: 14 September 2016

Tour de France, doping allegations & data theft. A case of insider threat?

A story has emerged in the last 24 hours where the training data of Chris Froome, the current leader of the Tour de France, has been stolen and published on social media in an attempt to show that he may be using performance-enhancing drugs...

Posted: 14 July 2015

Hibiscus Initiatives

Forensic Control is extremely happy to announce that our entire charitable donation for 2015 is going to be given to Hibiscus Initiatives. This London-based charity assists one of the most marginalised groups in society, BMER (Black Minority Ethnic & Refugee) foreign national and migrant women serving a custodial sentence in the UK. We’ll be giving 5% of our annual profits to Hibiscus Initiatives as part of our developing corporate social responsibility programme...

Posted: 30 April 2015

Our valuable data has gone. Who took it?

In this post I discuss how computer forensics can assist when intellectual property (IP) theft is suspected. In my previous post on this topic, I looked at ways of reducing the likelihood of IP theft. But if the worst was to happen and IP theft did occur, how does computer forensics help you discover who did it, when and what happened to the data that was stolen?

Posted: 27 February 2015

Reducing IP theft, a view from computer forensics

Following our introduction to IP theft and computer forensics, this article identifies steps to help reduce the likelihood of IP theft from your organisation. These are put into three categories; audit, assess and action. As you’ll see in the case study, preparation before the event occurs pays off...

Posted: 3 February 2015

IP theft & computer forensics for non-geeks

If you’re responsible for creating, storing or managing material of value then the unauthorised distribution of such items will be of concern. Over the next few weeks I’ll be posting a series of short articles on intellectual property (IP) theft and how computer forensics can help trace it’s distribution, allowing you to regain control. Be it creative works, customer databases or any digitally stored information that is of value...

Posted: 26 January 2015

Smart phones – what you need to be aware of

Smart phones offer perhaps the quickest exit route for your organisation’s data. With the widespread practice of allowing staff to use their own mobile devices at work, reviewing the use of smart phones in the workplace is now more relevant than ever. Although “bring your own device” is popular with staff, it presents a number of issues to those responsible for their firm’s data and where it may end up...

Posted: 6 January 2015

BBC drama The Fall shows how digital forensics can be used to solve crimes

This Daily Telegraph piece, although rather coming across as a product advert, contains a good explanation of what computer forensics is capable of. The BBC drama The Fall must also be congratulated for containing the most accurate depiction of digital forensics...

Posted: 19 December 2014

Looking beyond the headlines

We live in an age of hyped stories, readily-shared opinions and trial by social media. In such an environment if your company is to have confidence and authority in its position then you need to look beyond the headlines to get the full story...

Posted: 10 December 2014

Office Christmas parties, workplace indiscretions (and worse)

A long-term fixture of the work calendar is the dreaded/ wonderful office Christmas party. Drink-fuelled inappropriate behaviour, once one person’s word against another, may now have longer-term consequences in the digital age. What was said at the office party may continue via text messages, emails, the exchange of photographs, Facebook, WhatsApp, Kik, and similar...

Posted: 3 December 2014

What is computer forensics?

Computer forensics may be a term you've encountered, but what exactly is it? "Forensic" can be defined as the use of science to establish evidence before a court of law. Computer forensics, like other forensic disciplines, fits this definition but the focus is on...

Posted: 24 November 2014

IS beheading videos. Are they genuine?

I’m sometimes approached by news organisations for my opinion on digital forensic topics. Today I was asked about the latest IS video, showing the mass beheading of Syrian troops and the (as yet unconfirmed) death of Abdul-Rahman Kassig...

Posted: 16 November 2014

CONTACT US

* Required field

First Name *

Last Name *

Company *

Job title *

Telephone *

Email *

Country *

Comments

How did you hear about us?

captcha

Please enter the characters above