The Anatomy of Business Email Compromise (BEC)

Business email compromise (BEC) is an effective cyberattack that uses deception and impersonation to steal large sums of money from organizations.  If an organization relies on wire transfers to make or receive payments then, sooner or later, it will be targeted.  Furthermore, successful BEC attacks are financially devastating with losses regularly exceeding $100,000.  Though there […]

January 16, 2019 |

Top 10 Cybersecurity Tips for Organizations

"There are risks and costs to a program of action - but they are far less than the long range cost of comfortable inaction." - John F. Kennedy 1. Have a written incident response plan and practice it on a regular basis. Time is of the essence when responding to a data breach. Every second [...]August 23, 2018 | Tim Opsitnick

Ohio House Testimony: Senate Bill 220

Senate Bill 220: Data Protection Act Written Testimony Timothy M. Opsitnick Technology Concepts & Design, Inc. (TCDI) June 27, 2018

July 6, 2018 | Tim Opsitnick

Ohio Senate Testimony: Senate Bill 220

Senate Bill 220: Data Protection Act Testimony Timothy M. Opsitnick Technology Concepts & Design, Inc. (TCDI) January 10, 2018

July 6, 2018 | Tim Opsitnick

Four Steps to Effective Cybersecurity Logging

The Importance of Cybersecurity Logging Logs are crucial elements to breach investigations.  However, some investigations suffer from a lack of logs.  In such cases, the company must assume the worst if no evidence can be brought to the contrary. This may require sending notifications to an entire customer base or paying large fines.  Some of […]

May 30, 2018 | Eric Vanderburg

GDPR: Success Strategies for Redefining Your Business

The General Data Protection Regulation (GDPR) is set to go into effect on May 25, 2018, and yet many companies are still wondering if GDPR applies to them. The short answer is that it probably does. The GDPR requirements are incredibly broad, impacting any organization that stores data on Europeans. This includes the bed and […]

March 7, 2018 | Eric Vanderburg

5 Secrets to Survive the Encryption Apocalypse

The zombie apocalypse is frequently mentioned in literature and pop culture.  Some have even taken steps to protect against this fictitious threat.  However, there is a threat that is much more likely and very devastating to businesses and individuals alike.  I am referring to the encryption apocalypse caused by ransomware.  Just as zombies turn intelligent […]

February 14, 2018 | Eric Vanderburg

Part 4: A Timeline of Ransomware Advances

Ransomware, the malicious code that holds so much data captive, is now more commonplace than data breaches.  It continues to be a thorn in the side of companies large and small, and it has enriched many cyber criminals in the course of its history.  It targets computers, mobile devices, and even IoT. The ransomware we [...]December 27, 2017 | Eric Vanderburg

Part 3: The 6 Phases of an Advanced Ransomware Threat

The vast majority of ransomware attacks target a region or demographic, but there are some that are strategically selected to do the most damage and make the largest profit.  Extortionists go through great effort to penetrate a business, and the ransom demands for these Advanced Ransomware Threats (ARTs) far exceed those for a typical attack. […]

December 20, 2017 | Eric Vanderburg

Part 2: The Psychology Behind Infamous Ransomware

Cybercrime is very much a psychological game and ransomware is no different.  Psychology plays a role in almost all aspects of an attack from determining whether phishing messages effectively grab the attention of target users to whether victims pay the ransom. Psychology of ransomware distribution A majority of ransomware is distributed through phishing emails, instant […]

December 13, 2017 | Eric Vanderburg

Request Info

TCDI | Computer Forensics | Cybersecurity | Litigation Technology