Coronavirus & Remote Work Considerations

As the rapidly developing Coronavirus situation continues to unfold, many employees may soon be required to work from home to help minimize exposure.  There are important cybersecurity considerations when working remotely that, if ignored, place your entire organization at risk. Remote work can be done securely with the proper procedures, training, and technology in place. [...]March 17, 2020 | Eric Vanderburg

CCPA’s Far Reaching Impact on Third Parties

The California Consumer Privacy Act (CCPA) is now in effect, and its impact will be far-reaching. A cursory glance at the CCPA compliance might lead you to believe that it only impacts those who are working in California. After all, the Act was created to protect the privacy rights of California residents. However, our world [...]January 28, 2020 | Eric Vanderburg

The Anatomy of Business Email Compromise (BEC)

Business email compromise (BEC) is an effective cyberattack that uses deception and impersonation to steal large sums of money from organizations. If an organization relies on wire transfers to make or receive payments then, sooner or later, it will be targeted. Furthermore, successful BEC attacks are financially devastating with losses regularly exceeding $100,000. Though there […]

January 16, 2019 |

Cyber Monday and Cybersecurity: Best Practices to Keep Data Safe

It’s that time of year again. The weather is getting colder, Starbucks has changed from pumpkin to peppermint and Christmas decorations are lining the stores (it’s only November, but that’s an argument for another day). As people are recovering from Thanksgiving, many are expected to shop online this Cyber Monday. Cyber Monday is one of [...]November 26, 2018 | Eric Vanderburg

Top 10 Cybersecurity Tips for Organizations

"There are risks and costs to a program of action - but they are far less than the long range cost of comfortable inaction." - John F. Kennedy 1. Have a written incident response plan and practice it on a regular basis. Time is of the essence when responding to a data breach. Every second [...]August 23, 2018 | Tim Opsitnick

Ohio House Testimony: Senate Bill 220

Senate Bill 220: Data Protection Act Written Testimony Timothy M. Opsitnick Technology Concepts & Design, Inc. (TCDI) June 27, 2018

July 6, 2018 | Tim Opsitnick

Ohio Senate Testimony: Senate Bill 220

Senate Bill 220: Data Protection Act Testimony Timothy M. Opsitnick Technology Concepts & Design, Inc. (TCDI) January 10, 2018

July 6, 2018 | Tim Opsitnick

Four Steps to Effective Cybersecurity Logging

The Importance of Cybersecurity Logging Logs are crucial elements to breach investigations.  However, some investigations suffer from a lack of logs.  In such cases, the company must assume the worst if no evidence can be brought to the contrary. This may require sending notifications to an entire customer base or paying large fines.  Some of […]

May 30, 2018 | Eric Vanderburg

GDPR: Success Strategies for Redefining Your Business

The General Data Protection Regulation (GDPR) is set to go into effect on May 25, 2018, and yet many companies are still wondering if GDPR applies to them. The short answer is that it probably does. The GDPR requirements are incredibly broad, impacting any organization that stores data on Europeans. This includes the bed and […]

March 7, 2018 | Eric Vanderburg

5 Secrets to Survive the Encryption Apocalypse

The zombie apocalypse is frequently mentioned in literature and pop culture.  Some have even taken steps to protect against this fictitious threat.  However, there is a threat that is much more likely and very devastating to businesses and individuals alike.  I am referring to the encryption apocalypse caused by ransomware.  Just as zombies turn intelligent […]

February 14, 2018 | Eric Vanderburg

Request Info

TCDI | Computer Forensics | Cybersecurity | Litigation Technology