Eric Vanderburg

Eric Vanderburg is a graduate from Kent State University with a Bachelor of Science in Technology and a Masters of Business Administration with a concentration in Information Systems. During and after his education he worked as a consultant specializing in the development and maintenance of information management and network security systems for businesses, law firms, and government agencies.  He was a professor of computer networking at Remington College where he taught courses on information security, database systems, and computer networking and has been invited to speak at many organizations and campuses on technology and information security.

Written By Eric Vanderburg

Cyber Monday and Cybersecurity: Best Practices to Keep Data Safe

It’s that time of year again. The weather is getting colder, Starbucks has changed from pumpkin to peppermint and Christmas decorations are lining the stores (it’s only November, but that’s an argument for another day). As people are recovering from Thanksgiving, many are expected to shop online this Cyber Monday. Cyber Monday is one of [...]November 26, 2018 | Eric Vanderburg

Four Steps to Effective Cybersecurity Logging

The Importance of Cybersecurity Logging Logs are crucial elements to breach investigations.  However, some investigations suffer from a lack of logs.  In such cases, the company must assume the worst if no evidence can be brought to the contrary. This may require sending notifications to an entire customer base or paying large fines.  Some of […]

May 30, 2018 | Eric Vanderburg

GDPR: Success Strategies for Redefining Your Business

The General Data Protection Regulation (GDPR) is set to go into effect on May 25, 2018, and yet many companies are still wondering if GDPR applies to them. The short answer is that it probably does. The GDPR requirements are incredibly broad, impacting any organization that stores data on Europeans. This includes the bed and […]

March 7, 2018 | Eric Vanderburg

5 Secrets to Survive the Encryption Apocalypse

The zombie apocalypse is frequently mentioned in literature and pop culture.  Some have even taken steps to protect against this fictitious threat.  However, there is a threat that is much more likely and very devastating to businesses and individuals alike.  I am referring to the encryption apocalypse caused by ransomware.  Just as zombies turn intelligent […]

February 14, 2018 | Eric Vanderburg

Part 4: A Timeline of Ransomware Advances

Ransomware, the malicious code that holds so much data captive, is now more commonplace than data breaches.  It continues to be a thorn in the side of companies large and small, and it has enriched many cyber criminals in the course of its history.  It targets computers, mobile devices, and even IoT. The ransomware we [...]December 27, 2017 | Eric Vanderburg

Part 3: The 6 Phases of an Advanced Ransomware Threat

The vast majority of ransomware attacks target a region or demographic, but there are some that are strategically selected to do the most damage and make the largest profit.  Extortionists go through great effort to penetrate a business, and the ransom demands for these Advanced Ransomware Threats (ARTs) far exceed those for a typical attack. […]

December 20, 2017 | Eric Vanderburg

Part 2: The Psychology Behind Infamous Ransomware

Cybercrime is very much a psychological game and ransomware is no different.  Psychology plays a role in almost all aspects of an attack from determining whether phishing messages effectively grab the attention of target users to whether victims pay the ransom. Psychology of ransomware distribution A majority of ransomware is distributed through phishing emails, instant […]

December 13, 2017 | Eric Vanderburg

Part 1: The Economics of Ransomware

We all know money is the motivating force behind cybercrimes like the creation and distribution of ransomware. The interesting twist with ransomware is that the basic rules of supply and demand become a little hard to follow. Typically you have a buyer and a seller. In this case, the distributor—or supplier—have to steal what’s in […]

December 6, 2017 | Eric Vanderburg

The Lonely Castle: Insights into the Evolution of Cybersecurity Defense

This technological era is one that changes rapidly and so do defense strategies.  In the ancient world, combat strategies might have stayed the same for generations, but today the strategies of attackers and defenders evolve at an ever-increasing pace. The castle approach was used a decade ago.  Information systems were walled up behind castle fortifications, […]

November 29, 2017 | Eric Vanderburg

4 Cybersecurity Tips for Traveling This Holiday Season

Black Friday and Cyber Monday.  These are two of the largest shopping days every year, and every year you hear security experts warn about the dangers of bad links and malware infested emails promising the best online deals.  Although it is the same old story year after year, it continues to be relevant, because let’s […]

November 22, 2017 | Eric Vanderburg

Request Info

TCDI | Computer Forensics | Cybersecurity | Litigation Technology