Client Login

File Scan Report

Sunday, February 12, 2017 | BY: Giaspace

The underlying cause identified for many data breaches is that the organization did not know that protected data was stored on a device that was lost or stolen. After a breach of 4 million patient records a hospital executive said, “Based on our policies that data should not have been on those systems.” The File Scan Report identifies data files stored on computers, servers, and storage devices. It does not read the files or access them, but just looks at the title and file type. This report is useful to identify local data files that may not be protected. Based on this information the risk of a breach could be avoided if the data was moved to a more secure location, or mitigated by encrypting the device to protect the data and avoid a data breach investigation.

Recent Posts

Comcast Internet Outage Nationwide

As a private cloud provider, we need to make sure we limit downtime for our clients.  Today we received a…

Monday, November 6, 2017

KRACK WPA EXPLOIT

Mathy Vanhoef discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range…

Wednesday, October 18, 2017

There is Always Someone Cheaper

It’s true: There is always someone who will do it cheaper. The image above is one that had resonated with…

Wednesday, October 18, 2017

How to Prevent Ransomware And Discourage Data Kidnappers

If the thought of malware is scary, then the idea of ransomware is downright terrifying. A Trojan might steal sensitive…

Tuesday, October 10, 2017

Tech Tools

Test an HTTPS Secured Web Server This free SSL / TLS web server testing tool conducts a thorough analysis of…

Monday, September 4, 2017

Cyber Security Presentation 2017

Monday, September 4, 2017

Ransomware Checklist

Credit goes to KnowBe4

Wednesday, February 22, 2017

HIPAA Supporting Worksheets

A set of individual documents are provided to show detailed information and the raw data the backs up the Evidence…

Thursday, February 16, 2017

Network Share Identification Worksheet

The Network Share Identification Worksheet takes the list of network shares gathered by the Data Collector and lets you identify…

Sunday, February 12, 2017

Computer Identification Worksheet

The Computer Identification Worksheet takes the list of computers gathered by the Data Collector and lets you identify those that…

Sunday, February 12, 2017

Trusted By

Free Consultation 866-442-7723

Partners & Certifications