Experienced electronic discovery, incident response, litigation support, forensic analysis. Certified Computer Examiner – #581. GIAC certified.





Ransomware Protection Checklist

Our Ransomware Protection Checklist has detailed steps to defend against ransomware and other malware. Firewall, router, IDS, SIEM, applications & more.

Top ways to protect your business against phishing attacks

In this article, we explore some countermeasures your company should take to fend off phishing. Here are some best practices an organization can implement to stop phishing or limit the impact of a successful phishing attempt.