08Mar
11Jan
Digital Evidence must be Secure and Preserved in order to be Admissible!
Digital Evidence must be Secure! The wireless digital world has created a whole new landscape for criminals. Inadvertently, criminals accidentally keep detailed records of their criminal activity in their electronic devices. GPS keeps an accurate track of where the device or phone has been. Oddly, Criminals feel that if their data is safe in these devices and that no one can get at it. We are all aware that people can wirelessly access to sensitive information. That's how hackers make...
07Dec
RF Shielded Pouches-Privacy Bags!
RF Shielded Pouches-Privacy Bags! Security of private digital information is important today. The number of forms of passwords and levels of verification are ever increasing. Obviously, there are more nefarious attempts than ever before to access digitally stored information. Banks, email accounts, credit cards, and medical records require several levels of proof of identity before allowing access to accounts. Though it is time consuming, these levels add protection to your important information. Many of us carry electrical devices on which...
26Oct
Personal/Home Shielding reduces EMI Exposure!
Personal/Home Shielding reduces EMI Exposure! In today's wireless world, we endure constant exposure to RF waves. Though there is no absolute proof of health risks due to RF wave exposure, there is certainly concern regarding exposure. EHS (Electromagnetic HyperSensitivity), the name given to EMI sensitivity, involves nervous system symptoms. Symptoms include headaches, fatigue, stress, sleep disturbances, and skin irritation among many others. Many sufferers of EHS claim that their symptoms decline when they shield themselves from RF/EMI exposure. Personal Shielding...
19Oct
Digital Device Security-RF Shielded Pouches!
Digital Device Security-RF Shielded Pouches! Our digital devices are wonderful, they allow us easy access to our private information all the time! We don't leave home without them, and always have them nearby. Unfortunately, this private information is also accessible by nefarious others. In today's world, there are people who make a living by illegally wirelessly accessing personal digital devices. They access the information using unsecure Wi-Fi connections such as internet cafes or guest connections in restaurants and hotels. It...
07Sep
VTT-Experience, Expertise, Excellence and Service!
VTT-Experience, Expertise, Excellence and Service! VTT has been in the conductive metalized textiles supply business for sixteen years. We have a lot of experience, but VTT doesn't just settle for that. We strive for excellence, creating new products using these textiles and are constantly looking for ways to improve on them. Our teams, from Research and Development, Design, Sales and Manufacturing are experts in their fields. Most of our manufactured products are custom designed and manufactured to our customer's specifications...
17Aug
RF Shielding-Block Unwanted Access!
RF Shielding-Block Unwanted Access! Our wireless devices store our private information. We count on them to keep that information secure from unwanted access. We are able to access our bank and credit card information and use it daily. Businesses use their computers to store confidential information about their customers and trade secrets. Sadly, there are hackers out there who would like to use this information in criminal ways! It seems like we hear about data breaches daily or weekly on...
08Aug
Computer/Digital Forensics-Analysis of Digital Evidence!
Computer/Digital Forensics-Analysis of Digital Evidence! The terms Computer Forensics and Digital Forensics are often used interchangeably. Technically, computer forensics refers to the investigation of computers. Digital Forensics refers to the investigation of ALL digital devices. In the real world, Digital Forensics is probably the more accurate name. Digital data storage is a component of almost all criminal activities investigations. Evidence is often hidden in computers, cell phones, flash drives, and even in cameras! Criminals are often painstaking in their data...
17May
Digital Privacy-How do we Achieve it?
Digital Privacy-How do we Achieve it? Undoubtably, today's hackers are becoming more sophisticated. The news brings stories daily about ransomware, security breaches, and identity theft. How can we protect ourselves from these personal attacks? Many of these crimes can be prevented logically. Protecting electronic devices with updated antivirus programs is mandatory. Common sense data security measures are important in daily situations. These include not leaving a computer open when you leave the workspace, and not opening emails and links that...
03Mar