Have any questions? Just call us at 1.866.900.4236

May 4, 2016

No Comments

Data Breaches: Small Business Edition

2016 Data Breach Investigations Report: Small Business Owner Cybersecurity Edition

Every year, Verizon partners with various public and private sector entities to create this annual investigative report. It covers real-world data breaches and computer security incidents from the prior year. The 2016 Data Breach Investigations Report (DBIR) covers data from 2015 and this is the eighth (8th) year for this annual report.

**Disclaimer: This blog post is for informational purposes only and should not be construed as legal advice. You should always contact your legal counsel or attorney for legal advice. This list is not inclusive and is merely an informational guide.**

Read more

April 22, 2016

No Comments

Evansville Podcast Interview

Brad Garnett discusses his role as a Digital Forensic Examiner with Kemper Forensics and the difference between hacking and digital forensics. We dive into his background in law enforcement, teaching, the dangers of some USB/thumb drives, ransomware, the accuracy of Mr. Robot, and the Apple vs FBI case.

http://evansvillepodcast.com/brad-garnett-digital-forensic-examiner

Read more

March 18, 2016

No Comments

Stolen Laptop with Patient Health Information: Data Breach?

Disclaimer: Always consult with your attorney/legal counsel for legal advice.


Does a stolen laptop containing patient health information [PHI] equate to a data breach? In simplest form….yes, if unsecured. No, if encrypted (see HIPAA Final Rule outlined below).

Bloomington based Premier Healthcare, LLC. discovered a stolen laptop from one of its billing offices on January 4, 2016. On January 6th, a police report was completed by the Monroe County Sheriff’s Office. Premier Healthcare stated that the laptop was password-protected, but was not encrypted. There were emails located on the laptop’s hard drive that contained some screenshots, spreadsheets, and pdf documents that were used to address billing issues with patients, insurance companies, and other healthcare providers. Premier further stated that combinations of patient demographic information (i.e. name, date of birth, medical record number, insurance information, and/or some clinical information) for 205,748 individuals were contained in these documents. For 1,769 patients, social security numbers, and/or financial information could potentially be accessed on the laptop.

Quick Timeline

  • December 31, 2015: Date laptop believed to have been stolen from the Billing Department office
  • January 4, 2016: Premier Healthcare discovered stolen laptop
  • January 6, 2016: Police report filed with Monroe Co Sheriff’s Office
  • March 3, 2016: Premier Healthcare statement posted to website
  • March 4, 2016: Premier Healthcare notifies HHS regarding a potential data breach (HIPAA Breach Notification Rule)
  • March 7, 2016: Stolen Laptop returned via U.S. mail to Premier Healthcare and engages with forensic firm for analysis
Read more

March 8, 2016

No Comments

KeRanger: New Mac OS X Ransomware

Yes, even Apple Macs are prone to getting malware, but this new malware identified over the weekend by Palo Alto Networks requires a set of unique circumstances. First, the ransomware infected the Transmission BitTorrent client-side installer for Mac OS X on the Transmission BitTorrent website. Palo Alto has named this ransomware “KeRanger”. At first look, it would appear that the website may have been compromised and the attackers uploaded the malicious version to replace the legitimate, open source version. For our readers that may not be familiar with bitorrent, it is a peer-to-peer file sharing protocol for sharing files and large amounts of data. BitTorrent clients have legitimate and illegitimate purposes. Wikipedia has an animated GIF to demonstrate this concept. This ransomware was signed with a valid Apple developer certificate, which is troubling and is believed to have been stolen. Apple has since revoked this certificate, so if you attempt to open the Transmission app it will warn you. You should Trash the .app

Read more

February 22, 2016

No Comments

Successful Physical Extraction of a Severely Damaged iPhone 4

Every now and then we get a phone into our lab that requires some extra care to successfully acquire a client’s data. The photo below is of a damaged iPhone 4. The owner of this iPhone was in a severe, auto accident last year and the phone was brought to our Evansville, Indiana office for forensic extraction and analysis.

Today, we were pleased to inform our client that our certified forensic examiners were able to successfully acquire all the data residing on this iPhone 4 using traditional (and even non-traditional) mobile device forensic techniques. Our client is now able to access photographs, personal information, and other data that they once thought they would never see again. Our client had stated that this iPhone’s data was irreplaceable and we are pleased that we were happy to create another raving fan who used our forensic services!Kemper Forensics iPhone 4 Recovery

Damaged iPhone 4

Damaged iPhone 4

Read more

December 15, 2015

No Comments

Phishing Email Leads to $750,000 OCR HIPAA Settlement

In a press release dated December 14, 2015 U.S. Department of Health and Human Services Office for Civil Rights announced a settlement with the University of Washington (UWM) for violating the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule.

In November of 2013, OCR initiated an investigation of the UWM following receipt of a breach report of approximately 90,000 individuals electronic protected health information (e-PHI) was accessed after an employee opened an email attachment that contained malware. The malware compromised the organization’s IT infrastructure stealing patient information, such as names, date of births, social security numbers, medical record numbers, billing information, etc.

Read more

July 22, 2015

1 Comment

Car Hacking: Researchers Remotely Hack Jeep Cherokee

The story

**Update July 24th*: Reports show Fiat-Chrysler will be recalling 1.4 million vehicles

Yesterday, Wired.com broke the story of how two security researchers remotely hacked into a Jeep Cherokee that was driven by one of their journalists. The journalist agreed to test drive this motor vehicle while the security researchers wirelessly connected to the vehicle and began controlling various components of the vehicle from miles away. The security researchers have been conducting research in this area for several years. In 2013, the same journalist test drove a Ford Escape and Toyota Prius in South Bend, Indiana, and researchers were able to disable the vehicle’s brakes, honk the horn, pull on the seatbelt, and even steer the vehicle in a parking lot. You can read the full current story on Wired.com.

Read more

June 2, 2015

No Comments

ISBA Solo and Small Firm Conference

We are pleased to be attending the Indiana Bar Association’s Law Expo June 4th through June 6th in historic French Lick, Indiana. If you are attending this conference and are looking at ways to incorporate forensic services into your law practice, please stop by our booth and see us! Solo and small firms can really benefit from digital evidence in their law practice!

We will also have someone available to discuss forensic accounting and our business valuation services.

Event Schedule: http://www.inbar.org/events/Sessions.aspx?id=514910

Read more

April 29, 2015

No Comments

IoT: Internet of Things

If you are entrenched in technology you’ve probably heard about IoT (Internet of Things). If you are not in the middle of technology mix, then IoT is something that you are going to hear more and more about in the future. So What is IoT? It is basically the movement of internet enabled devices embedded into many everyday items. This ranges from home automation (e.g. your internet capable thermostat), automobiles, and to wearable technology (e.g. Fitbit & Apple Watch), and everything in-between. Yes, the internet is all around us and it isn’t going anywhere.

Read more

March 11, 2015

No Comments

Welcome: Our Digital Forensic Services

As technology has changed through the years, so has the manner in which people communicate and share information.  If you want to learn how to do something, where to vacation, or just stay in tune with what is going on in the world, a Smartphone, tablet, or computer are all within reach to help you find that information.  Slow, dial-up Internet connectivity is a thing of the past and fast, high-speed Internet connectivity is now!

With the popularity of social media, e-mail, digital photography, document sharing, and other forms of electronic communication, people leave a trail of digital footprints every day.  These digital artifacts provide clues about an individual’s identity and activities and can prove to be critical during a number of situations businesses – and individuals – often face.  Digital forensics, e-discovery, and data recovery services can be utilized in civil litigation, divorce, business law, intellectual property theft, employee misuse, or business operational matters.

Read more