Eric Vanderburg

Eric Vanderburg is a graduate from Kent State University with a Bachelor of Science in Technology and a Masters of Business Administration with a concentration in Information Systems. During and after his education he worked as a consultant specializing in the development and maintenance of information management and network security systems for businesses, law firms, and government agencies.  He was a professor of computer networking at Remington College where he taught courses on information security, database systems, and computer networking and has been invited to speak at many organizations and campuses on technology and information security.


Written By Eric Vanderburg


Coronavirus & Remote Work Considerations

As the rapidly developing Coronavirus situation continues to unfold, many employees may soon be required to work from home to help minimize exposure.  There are important cybersecurity considerations when working remotely that, if ignored, place your entire organization at risk. Remote work can be done securely with the proper procedures, training, and technology in place. [...]March 17, 2020 | Eric Vanderburg

CCPA’s Far Reaching Impact on Third Parties

The California Consumer Privacy Act (CCPA) is now in effect, and its impact will be far-reaching. A cursory glance at the CCPA compliance might lead you to believe that it only impacts those who are working in California. After all, the Act was created to protect the privacy rights of California residents. However, our world [...]January 28, 2020 | Eric Vanderburg

Cyber Monday and Cybersecurity: Best Practices to Keep Data Safe

It’s that time of year again. The weather is getting colder, Starbucks has changed from pumpkin to peppermint and Christmas decorations are lining the stores (it’s only November, but that’s an argument for another day). As people are recovering from Thanksgiving, many are expected to shop online this Cyber Monday. Cyber Monday is one of [...]November 26, 2018 | Eric Vanderburg

Four Steps to Effective Cybersecurity Logging

The Importance of Cybersecurity Logging Logs are crucial elements to breach investigations.  However, some investigations suffer from a lack of logs.  In such cases, the company must assume the worst if no evidence can be brought to the contrary. This may require sending notifications to an entire customer base or paying large fines.  Some of […]

May 30, 2018 | Eric Vanderburg

GDPR: Success Strategies for Redefining Your Business

The General Data Protection Regulation (GDPR) is set to go into effect on May 25, 2018, and yet many companies are still wondering if GDPR applies to them. The short answer is that it probably does. The GDPR requirements are incredibly broad, impacting any organization that stores data on Europeans. This includes the bed and […]

March 7, 2018 | Eric Vanderburg

5 Secrets to Survive the Encryption Apocalypse

The zombie apocalypse is frequently mentioned in literature and pop culture.  Some have even taken steps to protect against this fictitious threat.  However, there is a threat that is much more likely and very devastating to businesses and individuals alike.  I am referring to the encryption apocalypse caused by ransomware.  Just as zombies turn intelligent […]

February 14, 2018 | Eric Vanderburg

Part 4: A Timeline of Ransomware Advances

Ransomware, the malicious code that holds so much data captive, is now more commonplace than data breaches.  It continues to be a thorn in the side of companies large and small, and it has enriched many cyber criminals in the course of its history.  It targets computers, mobile devices, and even IoT. The ransomware we [...]December 27, 2017 | Eric Vanderburg

Part 3: The 6 Phases of an Advanced Ransomware Threat

The vast majority of ransomware attacks target a region or demographic, but there are some that are strategically selected to do the most damage and make the largest profit.  Extortionists go through great effort to penetrate a business, and the ransom demands for these Advanced Ransomware Threats (ARTs) far exceed those for a typical attack. […]

December 20, 2017 | Eric Vanderburg

Part 2: The Psychology Behind Infamous Ransomware

Cybercrime is very much a psychological game and ransomware is no different.  Psychology plays a role in almost all aspects of an attack from determining whether phishing messages effectively grab the attention of target users to whether victims pay the ransom. Psychology of ransomware distribution A majority of ransomware is distributed through phishing emails, instant […]

December 13, 2017 | Eric Vanderburg

Part 1: The Economics of Ransomware

We all know money is the motivating force behind cybercrimes like the creation and distribution of ransomware. The interesting twist with ransomware is that the basic rules of supply and demand become a little hard to follow. Typically you have a buyer and a seller. In this case, the distributor—or supplier—have to steal what’s in […]

December 6, 2017 | Eric Vanderburg

Request Info

TCDI | Computer Forensics | Cybersecurity | Litigation Technology