TCS Forensics New Office Location

Richmond, British Columbia, Canada June 7, 2013 —TCS Forensics Limited is pleased to announce the relocation of their office. On June 1, 2013, TCS Forensics moved their main office to Unit 125- 3751 Jacombs Road in Richmond British Columbia V6V 2R4.

The move will accommodate recent growth and enable the company to continue to maintain superior customer service to its expanding clientele. “Everyone here at TCS Forensics is thrilled to move into our new home”, stated Keith Perrin, CEO and founder of TCS Forensics. “The move will allow our company to better facilitate our employees by doubling the square footage of our office and upgrading our in-house technology. The new location includes additional space for new Risk Management & E-discovery Labs. Most importantly, the relocation is driven by the company’s commitment to better serve its clients. The new office will bring our team together allowing a more collaborative approach to the new services.

TCS Forensics is the premiere forensics investigation company that specializes in mobile devices such as Iphone, Ipad, Blackberry, Samsung & 5300 others, computers, laptops and PC’s. We also specialize in network vulnerability/ Penetration Testing, Risk management and E-discovery. TCS Forensics has the largest private forensic lab in Western Canada serving clients from New Brunswick to British Columbia, Washington DC, Texas, California, Washington State and more. We provide onsite forensics 24 X 7 X 365 and service many happy clients from private individuals, corporate & public companies including law firms, municipalities, government ministries, financial institutions and private investigators.

Original Source: “June 2013 Press Release

Subject Matter Expert: Corporate Social Media Policy

By Alan Zisman – Business in Vancouver

Over half a billion of us – including me and probably you – have Facebook accounts.

There are over 100 million of us on Twitter and countless others using Linkedin and other social networking sites. Not surprisingly, what we do in those virtual places has implications for our employers whether we visit the sites at work or at home. How our time on Facebook (et al) affects our employer, however, is more complex than it might seem, as is the way our employer needs to respond.

For example, going on Facebook during work time – an obvious no-no, right? TCS Forensics’ computer forensics and data security consultant Ryan Mattinson notes that a management gut reaction to social media, perhaps as a result of “shoulder surfing” during a quick walkabout, may be to simply decide to ban access to these sites at work.

Mattinson suggests this is the wrong approach. It’s bad for morale, hard to enforce and ignores the legitimate uses of these sites on the job. He points out groups of employees who might need access to social media from work:

• IT staff might find social networks a valuable way to receive expert advice from peers;
• marketers may want to monitor your company’s viral campaign (or the competition’s); and
• HR might be using them to check up on potential hires.

But monitoring potential and current employees raises issues. Most of us understand that our employer might monitor what we do using a company-provided computer on the company network during company time. Your company may also feel it needs to know what you’re posting even if it’s been done using your own computer and on your own time.

Companies feel that it’s their business what you say about your job, the company, your boss, your colleagues and even the competition online regardless of where you were when you posted the comment.

If, however, companies are going to get involved in this sort of monitoring, clear policies and employee awareness and consent are needed. And this is where many companies fall down.

Last fall, Manpower, a U.S.-based company specializing in providing office temps to the marketplace, polled 34,000 employers in 35 countries about attitudes toward social media in the workplace.

Nearly 60% of the employers surveyed thought that social networks could be used to provide benefits to their organizations, including building their brands, fostering collaboration and communication, and recruiting and assessing new employees.
However, three-quarters of the employers surveyed (71% of the North American employers) had no formal policies covering employee use of social networking sites.

Employers who did have them felt that the policies helped prevent productivity loss by limiting non-business-related time spent at these sites.

Other benefits of formal policies noted by employers included protecting their organizations’ reputations, helping with recruitment and protecting proprietary information.

Mattinson points organizations to, which asks a quick 12 questions and then churns out a boilerplate social media acceptable use policy. However, he urges companies to go beyond that – take time, look at the policies in use by other companies ( offers 148 real-life examples) and, most of all, think about the unique needs and culture of each organization.

Sharlyn Lauby of Internal Talent Management suggests that while social networks seem new, “social media or new media is really media. Many organizations … already have a policy in place for working with media. Social media is merely an extension of what you already have in place.”

She hopes that organizations can build on what they’re already doing to develop and communicate guidelines, train staff to use these networks to benefit their organizations and build an environment to use social media positively within the organization.

Original Source: “Companies need guidelines for effective employee use of social media

Contributor: Wireless Encryption Vulnerabilities

By Alan Zisman

Life in the high-tech office rarely pauses to let you catch your breath.

Install a piece of software and, almost immediately, there’s an update, with bug fixes and maybe a new feature or two. It’s the same thing with this column. No sooner is a column in print than it needs an update.

Microsoft periodically rolls a bunch of Windows updates into a service pack. Here’s the High Tech Office 2010 – Service Pack 1: bug fixes and new additions to some of this season’s column.

BIV’s issue 1068 (April 13-19) column looked at HP’s TouchSmart tm2 – a nice laptop with touchscreen features. HP was promising an iPad-like Slate for the second half of 2010. My fear: if the Slate were to run Windows 7, its touch features would be awkward at best.

Soon after publication, HP bought Palm, whose Pre smartphone had failed to make much of a dent in iPhone sales.

HP has now announced that the Slate will run Palm’s very nice WebOS system rather than Windows. If HP can get software-makers developing apps for WebOS – something Palm wasn’t very successful at – it could have a solid iPad alternative.

The following week’s column (issue 1069; April 20-26)looked at the “threatscape” – the evolving perils that face online users. Since then, there has been some good security news. The first concerns phishing scams – e-mail tempting users to visit websites masquerading as banks or other financial institutions in order to steal log-in passwords. According to the Anti-Phishing Working Group, while phishing scams continue to multiply, financial institutions and Internet services and providers are responding quicker. According to the report, the average phishing website remained online for only 32 hours in 2009, down from about 50 the year before.

More good news: a Microsoft report released in late April notes that in the second half of 2009, Canada had 2.5 infected computers out of every 1,000 surveyed. That’s down from 8.1 per 1,000 two years previously.

The global infection rate, according to the report, was 7.0 per 1,000. Microsoft’s report agrees with Fortinet’s Derek Manky, quoted in issue 1069’s column, that fake security software is now the biggest threat to Windows computer users.

A week later, we looked at Motorola’s Milestone smartphone, one of a number of phones using Google’s Android operating system, a credible iPhone alternative. Recently, Android beat out iPhone sales, at least in the U.S. I haven’t seen equivalent Canadian statistics, but I suspect that’s not the case here. The U.S. has a wider variety of Android-powered phones to choose from and, down there, Apple’s iPhone is available only on the AT&T network, while in Canada you can get iPhone contracts with all three of the major mobile providers: Bell, Telus and Rogers/Fido.

Shortly after the column appeared, Motorola announced that the Milestone was the first Android phone in Canada to be updated to the new Android 2.1 version. Because it’s impossible to really remain technologically up to date, a few days later Google announced an even newer Android 2.2 version. So stay tuned.

The column in issue 1071 (May 4-10) looked at a pair of devices that allow home and small-business users to put multiple computers online and connect to a mobile phone company’s data network. Ryan Mattinson, a Computer Forensics and Security Consultant with Vancouver’s TCS Forensics, e-mailed with a potential concern. While Wi-Fi wireless connections can be easily setup to use strong encryption, Mattinson noted that the encryption standards used on mobile data networks “do not offer anywhere near this level of security.”

He pointed out that while providers are touting the increased security of their 3G networks, the first paper documenting a successful attack against encryption used by these networks has already been published.

Moreover, when 3G networks are not available, mobile devices drop down to the slower but more common 2G networks – and the encryption used on these widely used GSM networks was broken years ago. The result, according to Mattinson, is that “someone with $1500 worth of hardware … can passively monitor and record cellular data undetected.”

Those are my updates so far. Of course, by the time you get to read them – like Motorola’s Android 2.1 announcement – my updates will probably need updating.\

Original Source: “High Tech Office Service Pack 1: updates and information-bug fixes