Getting the 411: Modern Investigations and the San Gabriel Valley
Keystone Investigative Services, Inc. in the local news: To download full .pdf click here
Please enjoy our compilation of resources, articles and other publications. The reference guide below can allow you to select information by topic.
Keystone Investigative Services, Inc. in the local news: To download full .pdf click here
Cyber crime is on the rise and 2012 is already turning out to be a year for a major increase in malicious attacks. According to a recent article on MSMBC Technology (http://www.technolog.msnbc.msn.com/technology/technolog/why-2012-will-be-cybercrimes-hell-year-196836#/technology/technolog/what-if-our-phones-were-honest-us-192174) prominent hacks are taking place nearly every week. The area of Internet piracy and credit card fraud are booming as more and more…
Information Security is very important today. Check out our recent article which was published in the California Investigator Magazine. } What is Information Security? { “Information security, also termed cyber security, is the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction in order to provide confidentiality, integrity and availability.”…
Smartphone safety tips you need to know. Our article published in the January 2013 edition of California Investigator is posted below. In today’s technology landscape, people are becoming increasingly aware of security issues. It has almost become second nature for people to understand the importance of keeping their computers and laptops safe from unauthorized access…
In a recent article published by sfaxme.com, author Ashleigh Brown discusses important discoveries in data breaches caused by the use of emailed personal data. The article noted that since the August 2009 Breach Notification Rule came into existence it has been clear to everyone just how frequently healthcare and patient data is compromised across the nation. That rule…
This is an article from Huff Post, Tech which is well worth the re-post. It was written by Adam Levin. Please be mindful that just because technology exists doesn’t mean it is tested to be safe and secure. It is strongly suggested that you consider the privacy implications before selecting new technology. It may make…
As an investigator we use a barrage of sources to get information on our subjects. Much of the information can be obtained from open sources such as public records, the person’s online activities, what they do and where they go in public. Social Media for instance has transformed how we share personal information in general…
(This article is so eye-opening that we had to post it on our website. All business owners should read and take note. We are all living in a very different world and this is unfortunately, the new normal. -Keystone) By NICOLE PERLROTH APRIL 7, 2014 SAN FRANCISCO — They came in through the Chinese takeout menu. Unable…
Are you getting serious about your information security yet? If government employee data can be hacked and stolen from a major security provider, so can yours. In an article from August 7, 2014 entitled “Key Homeland Security contractor hacked, gov(erment) employee data likely stolen” rt.com explained how the Department of Homeland Security was cyber attached…