3 Ways to Secure Your Corporate Network in 2017

It’s pretty safe to say that 2016 was a rough-and-tumble year for a number of industries, and the number, size, and scope of cyber security breaches was off the charts. These include two huge data attacks against Yahoo! users, as well as smaller breaches of sensitive data from the FBI and the IRS, among many others. Even the United States Presidential Election is rumored to have been tampered with by hackers.

stockvault-fuzzy-virtual-padlocks-on-screen208205-768x512So what does this mean for business owners, medical clinics, and law firms that need to protect both their own private data and the data of their customers, patients, and clients? It means that 2017 needs to be the year of network security. Let’s take a look at the best ways to make that happen.

Check out the three ways to secure your network over on the Avalon blog…


SCCE Web Conference: Data Breaches- No Stranger to Small Firms

Michael McCartneyMichael McCartney, President/CEO of DIGITS LLC, will be presenting a SCCE Web Conference on the topic of: Data Breaches – No Stranger to Small Firms.

DIGITS LLC was founded in 2006 to fill the need in the legal and corporate communities for highly skilled digital forensics, proactive cyber security services, corporate computer investigations, cyber security incident response and advisory services, eDiscovery and litigation support services, and other investigation services.

SCCE Web Conference:

Data Breaches- No Stranger to Small Firms
February 19 , 2014
12pm CST | 1pm EST | 11am MT | 10am PST | 9AM AKST | 8AM HAST
Main Points Covered:
  • Be able to evaluate how secure your office network is
  • Identify gaps in your office’s data and network security.
  • Understand risk and liabilities to insecure network infrastructure

Mobile Forensics & Data Breach Repercussions

Buffalo Law Journal

DIGITS LLC, Digital Forensics Investigators, were featured twice this this weeks publication of the Buffalo Law Journal and Buffalo Business First.  Articles featured include:

DIGITS LLC fills the need in the legal and corporate communities for highly skilled digital forensics, proactive cyber security services, corporate computer investigations, cyber security incident response and advisory services, eDiscovery and litigation support services, and general digital forensic consulting needs.

Click the links below to read each of these articles from the source:



Are you prepared to deal with the Consequences of a Data Breach?


Having trouble viewing this email? Launch it in your browser.

The Consequences of a Data Breach?




Thursday, December 6, 2012

12:30 p.m. to 2:00 p.m. (Lunch will be provided)

DoubleTree Inn,10 Flint Road, Amherst, New York 14226

Lunch: 12:00 p.m. to 12:30 p.m

Presentation: 12:30 p.m. – 2:00 p.m.

Continue Reading

banner1According to Help Net Security, 80 major law firms were hacked in 2011banner1

Forty-six states have enacted Data Breach Notification Laws

Presented by:

escapewire solutions              digits llc

Data Security to Prevent Data Breach – Lunch & Learn

Have your data files been compromised? Your business is next.
Data Security to Prevent Data Breach.

Date: Thursday, December 6, 2012
Location: Doubletree Inn on 10 Flint Road, Amherst, 14226
Time: 12:00 p.m. to 2:00 p.m.

To Register for this event:

Continue reading

Training Cyber Defenders

DIGITS LLC’s Manager of Computer Forensics & Investigations, Kyle Cavalieri, was interviewed by The Buffalo News and featured in an article titled “Training Cyber Defenders.”  This article discusses sophisticated assaults and data breaches that have occurred on the networks the largest banks, and government agencies in the United States and how we are dealing with this cyber threat.

Author, Steven Watson, points out that “While the U.S. government is seeking to raise awareness of the dangers posed by hackers and cyber terrorists, experts say the federal agencies charged with preventing these attacks haven’t been able to hire enough workers trained in detecting and responding to these threats.”

To read the full article, please visit the DIGTIS LLC website: http://tinyurl.com/8whh7sx


Law Firms & CPA Firms Target of Organized HACKERS

Law Firms, CPA Firms, and other professional service organizations are becoming the latest targets for organized hackers to attack.  These industries all have something in common that is drawing hackers to them like a magnet; sensitive client information.

In November of 2009, the Federal Bureau of Investigation (FBI) issued their first official warnings concerning spear phishing E-mails targeting U.S. law firms and public relations firms.  The FBI stated in that warning that they had “assessed with high confidence that hackers are using spear phishing e-mails with malicious payloads to exploit U.S. law firms and public relations firms.”  Since then, we have seen a dramatic increase in successful compromises of these firms as well as CPA firms.  (To read the full FBI warning visit http://www.fbi.gov/scams-safety/e-scams/archived_escams)

According to Help Net Security, 80 major law firms were hacked in 2011. The article titled “Law Firms Get Hacked For Deal Data” explains that the hackers used a common tactic to gain access into the law firms’ data.  (http://www.net-security.org/secworld.php?id=12318)

Hackers have become very sophisticated. Continue reading

Hacking Community VS. Service Providers: How exposed are you? Computer Forensics Webinar

As our technology is getting smarter, so are the individuals that are looking to compromise your most sensitive data.  Today, the hacking community is looking for the easiest way to brake into your network to expose Personal Identifier Information (PII), Personal Credit Information (PCI), and Personal Health Information (PHI).  Most recently, law firms and financial institutions have been in the radar for a corporate data breach; as outlined in the Bloomberg article below.

“China-Based Hackers Target Law Firms to Get Secret Deal Data”

However, law firms and financial institutions are not the only industries in target, all service providers should be at risk.  It is very important to understand the risk that you and your company faces with the daily activities with laptops, smartphone and tablets.  It is also very important to understand the security precautions that should be addressed to keep you secure from a possible breach.

Please join DIGITS LLC in a Free webinar on October 9, 2012 at 11:00 a.m. EST

Click here to register http://tinyurl.com/8he3cye

Computer Forensics 101:Proactive Compliance

This Session focuses on the fundamentals of computer forensics analysis:

Real life case studies will be used to highlight what the computer forensic expert looks for on computers, smart phones and tablets. Identification of Electronically Stored Information (ESI) and how computer forensics is used to identify fraud as well as proactive compliance programs and regulatory inquires. You will learn what you can expect to gather from computers and smart phones whose contents become evidence in your cases.


Upon completion of this segment, you should be better able to:

1.    Understand the practical use of Computer Forensics in Data Loss Prevention (DLP).

2.    Understand what ESI is available from computers and smartphones.

3.    How to implement Proactive Computer Forensics techniques into Human Resource, Regulatory, Compliance, FCPA and other regulatory, compliance and Audit Programs.

Click here to register: http://tinyurl.com/8he3cye

For more information regarding this presentation or other upcoming events please contact Kelly Merz at kelly.merz@digitsllc.com