Kimmons Investigations Breaks the Mold with Litigation Support Services

Kimmons Investigative Services offers all of the expected services of a full service private investigation firm. This announcement breaks out of those expected roles and offers our clients the additional resource of litigation support services. Attorney Maisie A. Barringer brings nearly two decades of trial experience and legal expertise to KIS through her ability to […]

Protection of Huge Amounts of Corporate Data in the Cloud

According to Statista.com, from 2015 to 2022, corporate data in the cloud and stored on cloud servers has doubled from 30% to 60% in that short seven year period. That growth curve hasn’t slowed according to many experts, so corporations today are increasingly seeking ways in which to protect their data. Computer Forensics and Corporate […]

Covert Surveillance

What is Covert Surveillance and How is it Used in Business?

When many people think of surveillance, it is in the context of domestic situations and divorces. However, this post and our work at Kimmons Investigative Serives, Inc. is about corporate situations and how businesses use our covert surveillance services. It is important to know that covert surveillance must comply with constitutional mandates as well as […]

Digital Evidence, Data Recovery, and Forensic Analysis Techniques

In today’s digital age, the acquisition and preservation of digital evidence play a crucial role in various fields, including law enforcement, cybersecurity, and forensic investigations. With the increasing reliance on digital devices and technology, it is imperative to have effective methods in place to acquire and preserve this evidence. Digital evidence acquisition involves the process […]

What are Internal and External Risks in Business and How to Handle Them

Starting and growing a business creates success and employment for Americans. Small businesses employ approximately 64% of all American workers. The owners can grow wealth and retire comfortably by operating and growing a successful business. But, there are risks, both internal and external, and success will depend upon avoiding or overcoming them. Internal Risk Internal […]

Computer Forensics: An Overview

Computer Forensics: An Overview By: Reese Kimmons, MS ISA   When you delete a document or file from your computer, it doesn’t just go away.  Your operating system merely marks the space the data occupied as being available for use again.  Until that space is overwritten, and sometimes even after it is, all or part […]

PrivacyCon 2020: What you’ll see on the webcast

PrivacyCon is going virtual this year. As the just-released agenda for the fifth annual Gathering of the Gurus demonstrates, you’ll want to mark July 21, 2020, on your calendar and watch the webcast for thought-provoking research into topics related to consumer privacy and data security.   Read the entire article here.

FTC releases agenda for Safeguards Rule virtual workshop

Financial institutions collect personal information from customers every day, from names and addresses to bank account and Social Security numbers. The Gramm-Leach-Bliley Act’s Safeguards Rule requires those institutions to develop, implement, and maintain a comprehensive information security program. As part of its regulatory review process, the FTC has proposed changes to the Rule. Join us […]

Statement by DNI Ratcliffe on Recent Press Reporting

WASHINGTON, D.C. — Director of National Intelligence (DNI) John Ratcliffe today released the following statement:   “I have confirmed that neither the President nor the Vice President were ever briefed on any intelligence alleged by the New York Times in its reporting yesterday.”       FOR IMMEDIATE RELEASE ODNI News Release No. 25-20 June […]