Skip to content
Forensicon
CALL US NOW 888-427-5667
  • Home
  • AboutExpand
    • Computer Forensics Team
    • Chicago Computer Forensics
    • Forensicon Noted Cases
    • Careers at QDiscovery
    • Testimonials
  • Practice AreasExpand
    • Trade SecretsExpand
      • Trade Secrets Misappropriation
    • Employment LitigationExpand
      • Employment Litigation Defense
      • Wage & Hour Litigation
    • Internal InvestigationsExpand
      • Corporate Identity Theft
      • Corporate Security Breach
      • Illicit Employee Activity
    • Family Law
  • ServicesExpand
    • Computer Forensics ServicesExpand
      • Computer Forensics Expert Witness Testimony
      • Computer Forensic Analysis
      • Database Forensics
      • Enterprise Storage Failure & Data Recovery
    • Cell Phone Forensics
    • ConsultingExpand
      • Cyber Security Data Breach Response
      • Expert Witness Testimony & Reports
      • ESI Preservation & Collection
      • Online Content Preservation
    • e-DiscoveryExpand
      • Data Removal & Certification
      • Online Content Preservation
    • Internet Investigations
    • DVR Recovery Forensics
  • ResourcesExpand
    • Articles
    • Case Summaries
    • Computer Forensics Resources
    • Resource Documents
    • Forensicon Newsletters
    • Resource Links
  • News & EventsExpand
    • Forensicon News
    • Forensics Blotter
  • Contact Us
Forensicon
Home / Resources / Articles / An Ounce of Prevention

An Ounce of Prevention

There is an adage that says “an ounce of prevention is worth a pound of cure.” When it comes to the protection of trade secrets and/or intellectual property, this is doubly true. Many companies are being forced by legislation or contract to implement an effective incident response plan; the truly wise also consider preventing incidents in the first place.

One of the most common sources for network incidents is also a company’s greatest asset: its employees. When employees become unhappy, bad things can happen. When appropriate IT policies are enacted, companies can prevent many of these incidents from happening in the first place. The following are a few simple policies and actions for companies to consider.

Disable “auto-mount” on user computers. “Auto-mount” describes the process by which a computer automatically makes a connected device accessible for someone to use. For example, if a USB drive is connected to a Windows XP computer, the computer will mount the drive and assign it a drive letter. This makes it easy for a user to access the file data within the drive, and also makes it possible for data to be copied to/from the drive. By disabling this functionality, a user may connect a device to their computer, but will be prevented from transferring data between the device and the corporate network. Other operating systems have similar functionality even though they may call it by different names. The goal is to change settings so that a user cannot connect and use a storage device without IT department approval.

Disable “auto-run” on user computers. “Auto-run” describes the process that occurs when a user inserts a CD or DVD into a computer. The computer reads the files on the disk, and an EXE file (or similar) directs the computer to launch a specific application. A malicious program could be programmed to run by simply inserting a CD. Disabling the auto-run capabilities of a computer would reduce the chances of an “accidental” usage of software from within a CD/DVD disc.

Regulate usage of email and webmail accounts. User email data should be stored on a server that is backed up regularly. Companies may also prohibit the usage of webmail including web-based email services such as MSN, Yahoo, and Google. Webmail is a common way for users to transfer sensitive company file data outside of the company.

Audit users’ computers regularly. Regular audits of a user’s computer can reveal notable events that may allow a company to nip a problem in the bud. For example, reviews of Windows registry data can reveal connections of storage devices. Any devices which are not company property may be suspect and require further review. A regular audit of a system is a good way to make sure that policies are enforced. A competent forensic expert can review an image for any specific policy concerns that your company might have. Forensicon specializes in tailoring a review process which ranges from forensic preservation to reporting, and uses industry-standard tools and methodologies which stand up in court when needed.

Read More Articles…

Back to Resources…

Search

Related Service Offerings

Computer Forensic Analysis
Forensic Vault Service
Expert Witness Testimony & Reports
...more services

Articles

What is Forensic Hard Drive Imaging?
What is Metadata?
The Liability of Email as Evidence
Track Former Employee’s Computer Activities
Exploring fseventsd Forensics Techniques
...more articles

Forensicon © 2026. All Rights Reserved.

  • Website Privacy Policy
  • SiteMap
  • Website Disclaimer
Corporate Headquarters:
309 W Washington St., Ste 1300
Chicago, IL 60606
v. (888) 427-5667 f. (312) 427-5668
Contact us
Computer Forensics Experts
ESI Discovery Consultants
Digital Cyber Forensic Analysis
Computer Forensics Company
Michigan PI Agency# 3701205872
  • Home
  • About
    • Computer Forensics Team
    • Chicago Computer Forensics
    • Forensicon Noted Cases
    • Careers at QDiscovery
    • Testimonials
  • Practice Areas
    • Trade Secrets
      • Trade Secrets Misappropriation
    • Employment Litigation
      • Employment Litigation Defense
      • Wage & Hour Litigation
    • Internal Investigations
      • Corporate Identity Theft
      • Corporate Security Breach
      • Illicit Employee Activity
    • Family Law
  • Services
    • Computer Forensics Services
      • Computer Forensics Expert Witness Testimony
      • Computer Forensic Analysis
      • Database Forensics
      • Enterprise Storage Failure & Data Recovery
    • Cell Phone Forensics
    • Consulting
      • Cyber Security Data Breach Response
      • Expert Witness Testimony & Reports
      • ESI Preservation & Collection
      • Online Content Preservation
    • e-Discovery
      • Data Removal & Certification
      • Online Content Preservation
    • Internet Investigations
    • DVR Recovery Forensics
  • Resources
    • Articles
    • Case Summaries
    • Computer Forensics Resources
    • Resource Documents
    • Forensicon Newsletters
    • Resource Links
  • News & Events
    • Forensicon News
    • Forensics Blotter
  • Contact Us