Please ensure Javascript is enabled for purposes of website accessibility


Best Practices to Secure Your Organization

The current cyber threat landscape places business at a constant state of alarm. Businesses find themselves in a non-stop battle against viruses, Trojans, and hackers, some of which aim at stealing valuable intellectual property, while others just wreak havoc for the IT personnel and interrupt operations.  However, not all threats are external to an organization.  Some of the most damaging threats are those internal to a company, their own employees. Negligent employee disclosure of company proprietary information can have the most detrimental impact on the business. Whether an employee discloses valuable client information by accident, are working on company [...]

By |November 20th, 2018|Categories: Solutions|Tags: , , |

Email Headers: What can they tell the forensic investigator?

Email headers contain important information about the origin and path an email took before arriving at its final destination, including the sender’s IP address, internet service provider, email client, and even location. The information could be used to block future emails from the sender (in the case of spam) or to determine the legitimacy of a suspicious email. A review of the headers can also help to identify “header spoofing,” a strong indication the email was sent with malicious intent. Understanding the Header Fields Email headers are read chronologically from the bottom up and can be broken down into [...]

Go to Top