When You Travel, Your Data Travels Too


man-person-people-trainFor the advantageous traveler, flying is a comfort. Your seat folds into a bed, your meal is prepared by five-star chefs, and your email is hacked via the in-flight WiFi.
Wait, what was that last one?

It turns out that when you travel, your data is at a greater risk than usual. In-flight WiFi is just one example—hotels, airport lounges, and even cars have vulnerabilities that can allow hackers to glean valuable data while you’re in motion.

These vulnerabilities all have a common root—publicly available WiFi is easy to hack. The business owners who set up these networks aren’t security professionals, and may overlook common security measures. This makes it easy for hackers who are on the same network to intercept other communications conducted via WiFi.

Continue reading the full blog on Avalon’s site to learn how you can stop hackers from accessing your data while you’re on the go.

Keep Your Friends Close and Your W-2s Closer, Beware of Tax Identity Theft

If Melissa McCarthy was behind every identity theft, it might not be so terrifying. Unfortunately, that is likely not the case (although, it has not been confirmed).

melissa-mccarthyIdentity thieves are getting more sophisticated by the day. They used to steal your credit card number to buy a video game and grab a slice at the food court, but now they’re stealing identities to file tax returns and collect refunds.

The IRS has certainly improved its defense against phony refund requests—last year, as of March 5, 2016, the IRS identified 42,148 fraudulent tax returns involving identity theft, and identified 20,224 prisoner tax returns for screening, with $227 million claimed in fraudulent funds.[1] But these are simply the cases the agency is aware of, and there are likely many more. The IRS continues to expand its efforts to detect tax refund fraud.

Read more about fraudulent tax returns over on the Avalon blog…


Common Causes of a Network Breach


Nothing illustrates root causes of data breaches (among other things) quite like a nice pie chart. The Ponemon Institute’s 2016 study showed that malicious or criminal attacks still contribute to half of the pie, while negligent employees and system glitches share the other half.

The three top ways the 50% get to your sensitive data is insecure passwords, outdated software, and careless downloading.

Read more about the most common network breach vulnerabilities over on the Avalon blog…

Learning about Internet threats with WIVB

This WIVB story, reported by Jordan Williams, started with a local man that was victim to a cyber attack that appeared to take control of his personal laptop.   A FBI Buffalo representative and DIGITS LLC’s Director of Computer Forensics and Investigations both provided feedback from the “ransomware” attack.  It is very important to make sure that you are aware of these type of cyber attacks.  Both representatives reinforced that it is important to call to shut down your computer right away and call a security expert, like DIGITS LLC, if you fall victim from a computer virus similar to described here.

Check out this report WIVB, interviewing computer and security experts about this ransomware virus.

SCCE Web Conference: Data Breaches- No Stranger to Small Firms

Michael McCartneyMichael McCartney, President/CEO of DIGITS LLC, will be presenting a SCCE Web Conference on the topic of: Data Breaches – No Stranger to Small Firms.

DIGITS LLC was founded in 2006 to fill the need in the legal and corporate communities for highly skilled digital forensics, proactive cyber security services, corporate computer investigations, cyber security incident response and advisory services, eDiscovery and litigation support services, and other investigation services.

SCCE Web Conference:

Data Breaches- No Stranger to Small Firms
February 19 , 2014
12pm CST | 1pm EST | 11am MT | 10am PST | 9AM AKST | 8AM HAST
Main Points Covered:
  • Be able to evaluate how secure your office network is
  • Identify gaps in your office’s data and network security.
  • Understand risk and liabilities to insecure network infrastructure

Panelist Discussion “The Virtual Reality of White Collar Crime”

On December 12, 2013 infoTech Niagara will be hosting a panelist discussion, at the Buffalo Niagara Marriott, on the topic of “The Virtual Reality of White Collar Crime”.  Breakfast will be provided at 7:30 a.m. and the discussion will last until 10:00 a.m.

Panel of experts include:

Dennis C. VaccoB. Kevin Burke, JrMichael McCartney

  • Michael G. McCartney, President & CEO, DIGITS LLC

 Thursday, December 12

Where: Buffalo Niagara Marriott, 1340 Millersport Highway, Amherst, NY 14221

Time:  7:30 a.m. registration & full breakfast buffet; 8:15 a.m. – 9:45 a.m. presentation

Cost:  $20 ITN members; $40 non members

Click here to register for The Virtual Reality of White Collar Crime panelist seminar

Mobile Forensics

DIGITS LLC Mobile Forensics Over the last several years, the world of mobile forensics has seen a rapid evolution. The way in which the mobile devices has evolved has also increased the amount of evidence forensic examiners can retrieve from devices such as cellphones, tablets and portable GPS units. Mobile devices and their operating systems are changing every day so this evolution is far from over. As mobile devices get smaller it seems they are becoming more complex. Most smartphones and tablet devices can now perform the same functions as a laptop or desktop computer and in many cases they outperform their larger counterparts in both functionality and speed!

Our cellphones are very personal to us. We keep them close and use them often. We take family pictures, store our appointments and communicate with those dear to us; however this personal nature is no different for those who would use the devices for nefarious purposes.  Forensic examiners can capitalize on this feeling of safety and extrapolate additional data which may not be found on other devices such as a laptop or desktop computer.

mobile-phonesClients should not overlook company owned mobile devices when considering DIGITS to conduct a digital forensic investigation. These devices can contain a wealth of evidence involving proprietary company information, inappropriate activity and much more. A company’s future may literally be in someone’s pocket.

Deleted data on mobile devices is not a problem for DIGITS. Our forensic techniques allow us to delve into areas of the phone that typical users cannot access to find deleted data which may be absolutely critical to an investigation.

All is not lost if our client has a mobile device that is missing. With certain mobile devices, forensic examiners may not even need the device to conduct their investigation. For example, Apple and BlackBerry devices often back their data up onto an individual’s computer giving examiners the opportunity to see vital evidence such as text messages, media files, contacts and more from the back up files on laptops, desktops or the cloud.

Companies who utilize mobile devices need to think about the potential risk these devices could pose. If you, or your company has a mobile device which requires high-tech forensic examination, don’t wait a moment longer, call DIGITS today.

By: Christopher Nowak, Forensic Specialist



Who’s Who in WNY Technology 2013

Michael McCartneyMicheal McCartney, President/CEO of DIGITS LLC, was featured in Buffalo Business First’s Who’s Who in WNY Technology 2013.

Company expertise: Digital forensics, proactive digital forensics, corporate computer investigations, cyber security incident response, cyber security advisory services, eDiscovery and litigation support services.

Buffalo Business First Who’s Who in WNY Technology 2013 – http://bizj.us/sgo03/i/17

DIGITS LLC Digital Forensic Solutions


DIGITS & Harter Secrest & Emery featured on Greater Rochester Enterprise Podcast

Eyes on the Feature, Greater Rochester Economy, WHAM 1180

DIGITS LLC and Harter Secrest & Emery were featured on WHAM 1180’s “Eyes on the Feature” of the Greater Rochester Economy.  Jeff Calabrese, Partner of Harter Secrest & Emery, and Michael McCartney, President/CEO of Digits, discuss non-compete clauses and why it is important for businesses to have them.

Click on each of the links below to listen to each of the segments on non-compete clauses.

Importance of Non-Compete Clauses – 10:35
3 Main Categories of Non-Compete Disputes – 6:29
What Your Computer Usage Could Say About You – 14:38
What to Look For When Recruiting a New Employee – 7:29