3 Ways to Secure Your Corporate Network in 2017

It’s pretty safe to say that 2016 was a rough-and-tumble year for a number of industries, and the number, size, and scope of cyber security breaches was off the charts. These include two huge data attacks against Yahoo! users, as well as smaller breaches of sensitive data from the FBI and the IRS, among many others. Even the United States Presidential Election is rumored to have been tampered with by hackers.

stockvault-fuzzy-virtual-padlocks-on-screen208205-768x512So what does this mean for business owners, medical clinics, and law firms that need to protect both their own private data and the data of their customers, patients, and clients? It means that 2017 needs to be the year of network security. Let’s take a look at the best ways to make that happen.

Check out the three ways to secure your network over on the Avalon blog…


SCCE Web Conference: Data Breaches- No Stranger to Small Firms

Michael McCartneyMichael McCartney, President/CEO of DIGITS LLC, will be presenting a SCCE Web Conference on the topic of: Data Breaches – No Stranger to Small Firms.

DIGITS LLC was founded in 2006 to fill the need in the legal and corporate communities for highly skilled digital forensics, proactive cyber security services, corporate computer investigations, cyber security incident response and advisory services, eDiscovery and litigation support services, and other investigation services.

SCCE Web Conference:

Data Breaches- No Stranger to Small Firms
February 19 , 2014
12pm CST | 1pm EST | 11am MT | 10am PST | 9AM AKST | 8AM HAST
Main Points Covered:
  • Be able to evaluate how secure your office network is
  • Identify gaps in your office’s data and network security.
  • Understand risk and liabilities to insecure network infrastructure

ARMA Presents: Digital Forensic Investigator

ARMA International



Computer Forensics 101: Proactive Compliance”
Tuesday, January 15, 2013

 Delaware North Companies, Conference Room
40 Fountain Plaza, Buffalo, NY 14202

11:30 AM – Registration
12:00 PM – Lunch
12:30 PM-2:30 PM  Presentation

  Continue reading

Law Firms & CPA Firms Target of Organized HACKERS

Law Firms, CPA Firms, and other professional service organizations are becoming the latest targets for organized hackers to attack.  These industries all have something in common that is drawing hackers to them like a magnet; sensitive client information.

In November of 2009, the Federal Bureau of Investigation (FBI) issued their first official warnings concerning spear phishing E-mails targeting U.S. law firms and public relations firms.  The FBI stated in that warning that they had “assessed with high confidence that hackers are using spear phishing e-mails with malicious payloads to exploit U.S. law firms and public relations firms.”  Since then, we have seen a dramatic increase in successful compromises of these firms as well as CPA firms.  (To read the full FBI warning visit http://www.fbi.gov/scams-safety/e-scams/archived_escams)

According to Help Net Security, 80 major law firms were hacked in 2011. The article titled “Law Firms Get Hacked For Deal Data” explains that the hackers used a common tactic to gain access into the law firms’ data.  (http://www.net-security.org/secworld.php?id=12318)

Hackers have become very sophisticated. Continue reading

Digital Forensic Services

DIGITS LLC co-founders and staff have over 115 years of combined law enforcement experience in Digital Forensics and technology crime fighting. The co-founders of DIGITS LLC have a proven track record in national and international high profile internet crime investigations, computer forensic investigations and technology services at the federal, state and local levels.  Headquartered in Western New York, DIGITS LLC offers world-class expertise in computer forensic and data recovery services, corporate computer investigations, litigation support services, and network security advisory services to business around the country.  DIGITS LLC’s principals boast unrivaled expertise gained in distinguished careers in the federal, state and local criminal justice arenas as well as in academia and the private sector.

Continue reading

CASE STUDY: “Caller ID… Do you really know who is calling?”

By Bradley J. Bartram, Vice President of Information Technology , Chief Technology Officer

Assume you have two computers that need to communicate with each other.  The first computer is a database server that holds customer data and account information.  The second computer is some form of application server that allows users to interact with the data being stored on the first computer. There has to be some form of direct communication between the first and second computers.  Ideally the first computer should only allow specific users to access its data.

Historically, this process worked well for a little while.  When data began being stored on computers that actually had importance and value, less than honest people began to realize data had value, and networks began to get a little bit more public in-scope this all tended to fall apart.  It was trivial for an attacker to gain access to the network and then pretend to be a trusted computer and gain access to valuable data.

Continue reading

DIGITS LLC Consulting Services

Qualified, Experienced, Tested

DIGITS LLC team of computer forensics, digital evidence, and information security experts is unparalleled in the industry. The co-founders hold Top Secret Security Clearances with the U.S. Government.  Drawing from an array of backgrounds in law enforcement, Academia and the private sector, DIGITS professionals hold certifications from the leading computer forensic associations and software providers.  DIGITS experts have provided services and instruction to corporations, federal, state and local law enforcement and governmental agencies around the world, including high level and top secret intelligence and investigative agencies.

Continue reading