August 2006 - Vol. 5, Issue 2
In This Issue
Sign Up
Quick Links

On the Road with Cebic Technologies

In addition to providing security monitoring and consulting services, Cebic is also very much an educator on security issues. Over the last few weeks, Cebic CEO Beate Hybinette has spoken to the Greater Denver Chamber of Commerce and a Human Resource managers conference on security issues. You can catch her September 19 at the Lunch 'N Learn meeting at Universal Lending Corporation - 6775 E. Evans Ave, Denver CO 80224. The session will be held 8:30 to 10 a.m. and there is a $10 charge to be paid at door.

To schedule a Cebic presentation for your peer group or industry association, contact Beate at 303-987-3679, ext. 305.

Network security is a growing issue that isn’t going away. In fact, the threats to your computer system have escalated from nuisance to outright theft in a very short time frame. You don’t have to worry about system crashes and corrupted data today as much as you have to worry about online predators stealing corporate information and technology.

One result is a growing interest in learning more about computer security and Cebic is a part of the solution. This year, we began offering security courses - described below - in conjunction with Community College of Denver.

Cebic professionals are teaching two college-level courses on computer security this fall in conjunction with the Community College of Denver.

CISSP Certification Prep is a five-day boot camp to prepare IT professionals for the Certified Information Systems Security Professional (CISSP®) exam. Ideal for mid- and senior-level managers who are working toward or have attained positions as CISOs, CSOs or Senior Security Engineers, the course covers the 10 domains or the CBK (Common Body of Knowledge) as well as sample test questions.

The instructor, Johan Hybinette, is Chief Security Officer for Cebic Technologies Inc. Johan holds CISSP, CISM, ISSAP, ISSMP, IAM and IEM certifications and designations. He is a member of the Information Systems Security Association and the Information Systems Audit and a regular lecturer at several colleges.

Computer Forensics focuses on what happens when computer systems, machines or information are compromised. Computer forensics is used to determine the extent and how the breach occurred as well as the parties involved. Emphasis is placed on collecting evidence that can be used in criminal and civil courts of law.

When should you turn to computer forensics or outside experts? How can you protect your organization before data loss happens? What should you do when an employee leaves? How does data forensics support compliance objectives and how can it support your case in court? The answers to these questions are provided in this introductory course for C-level executives, managers, HP professionals and legal professionals.

The instructor, Bray Weaver, is a Senior Consultant for Cebic Technologies Inc., a certified computer forensics examiner and private investigator, and has more than 11 years of hands-on IT, security and data recovery experience.

For more information or to register for a class, visit Community College of Denver.

There’s one very simple step you can take to increase the odds that you can recover data from a failed hard drive, RAID array or storage device.

STOP everything you are doing. Unplug your computer and call a professional data recovery service.

When an IT system crashes or fails, anything you do from that point forward can reduce the likelihood that you will recover your data intact. In a worst case scenario, where heads fail on a drive, they may actually be in contact with the media, shearing data off the platter like a belt sander, explains Craig Snapp, MSRE and Chief Technology Officer of DataTech Laboratories, a Denver-based data recovery company that works with companies worldwide.

“If the media itself is not in an overly damaged state, 100% recovery is possible. But the more you attempt to restart or self diagnose a failing system, the more chances there are that you are destroying the media,” he explains.

Data loss can result from operator error, outside hackers, software conflicts, and hardware issues. But the most common cause is drive failure. According to industry statistics, 6% of all digital media will fail each year.

“Anytime you are working with a physically failed drive, you need to be doing so in a Class 100 certified clean room environment and your technician needs to have long-term experience in the manufacturing of hard drive or semi-conductor components,” Craig explains. “If you really want your data back, you don’t try to fix the problem on-site.”

Among the reasons Cebic Technologies refers clients with data recovery issues to DataTech Labs is the firm’s Class 100 certified clean room and highly qualified data recovery specialists with decades of experience in computer design, manufacturing and data recovery. DataTech recovers data from servers, desktops, laptops, all operating systems, USB flash drives, CD's, DVD's, zip, floppies, PDA's, cell phones, all digital camera cards, RAID arrays and much more.

Data recovery costs start at $500 with discounts for students, educational professionals, non-profits, and military personnel. We also like DataTech’s "no data, no cost" and "free evaluations policy". For more information, visit the DataTech web site at

Are You Backing Up Properly?

Meeting with a new client recently, I was asked to review and evaluate their backup procedures. The equipment was working, the backups were being performed faithfully on schedule at the end of each day, but there was no data on the backup drive. What happened?

It turned out with this particular system that a full copy of all the information and files the client wanted to maintain backups on needed to be copied to the backup system at the very start. Subsequent backups would then search the network for changed files and new information that needed to be added to the backup. With no data on the system, there was nothing to cross reference.

Backups are your most important resource in the event of a computer failure. Don't just backup your system. Check your backups periodically. Make certain the system is working properly. Build redundancy into your backup system. It is always going to be much more cost efficient to maintain a proper backup process than it will be to rebuild missing data files.

And don't hesitate to call Cebic when we can help with your backup procedures and hardware.


Beate Hybinette
Cebic Technology, Inc.

phone: 1-888-232-4226 | 303-987-3679

Forward email