{"id":182,"date":"2023-03-22T15:42:39","date_gmt":"2023-03-22T15:42:39","guid":{"rendered":"https:\/\/e5hforensics.com\/?page_id=182"},"modified":"2024-01-14T09:59:50","modified_gmt":"2024-01-14T09:59:50","slug":"articles","status":"publish","type":"page","link":"https:\/\/e5hforensics.com\/index.php\/downloads\/articles\/","title":{"rendered":"Articles"},"content":{"rendered":"\n<div class=\"section-wrapper\" data-id=\"nXb2VP\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-nXb2VP layout-boxed align-stretch\"><div class=\"guten-background-overlay\"><\/div><div class=\"guten-shape-divider guten-shape-divider-top\"><\/div><div class=\"guten-shape-divider guten-shape-divider-bottom\"><\/div><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-Gu3MDo\"><div class=\"guten-background-overlay\"><\/div><div class=\"sticky-wrapper\" data-id=\"Gu3MDo\"><div class=\"guten-column-wrapper\">\n<figure class=\"wp-block-image size-full has-custom-border is-resized is-style-default\" id=\"How-to-Respond-to-a-Ransomware-Attack\"><a href=\"https:\/\/e5hforensics.com\/wp-content\/uploads\/2023\/04\/How-to-Respond-to-a-Ransomware-Attack.pdf\"><img decoding=\"async\" width=\"393\" height=\"560\" src=\"http:\/\/e5hforensics.com\/wp-content\/uploads\/2023\/03\/How-to-Respond-to-a-Ransomware-Attack.png\" alt=\"How to Respond to a Ransomware Attack\" class=\"wp-image-183\" style=\"border-radius:3px\" title=\"How to Respond to a Ransomware Attack\" srcset=\"\/wp-content\/uploads\/2023\/03\/How-to-Respond-to-a-Ransomware-Attack.png 393w, \/wp-content\/uploads\/2023\/03\/How-to-Respond-to-a-Ransomware-Attack-211x300.png 211w\" sizes=\"(max-width: 393px) 100vw, 393px\" \/><\/a><\/figure>\n\n\n\n<h6 class=\"wp-block-heading has-zeever-secondary-color has-text-color\" id=\"How-to-Respond-to-a-Ransomware-Attack\">How to Respond to a Ransomware Attack<\/h6>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-E6NDA6\"><div class=\"guten-background-overlay\"><\/div><div class=\"sticky-wrapper\" data-id=\"E6NDA6\"><div class=\"guten-column-wrapper\">\n<figure class=\"wp-block-image size-full has-custom-border is-resized is-style-rounded\" id=\"Protecting-your-Cryptocurrency\"><a href=\"https:\/\/e5hforensics.com\/wp-content\/uploads\/2023\/03\/Protecting-your-Cryptocurrencies.pdf\"><img decoding=\"async\" width=\"372\" height=\"530\" src=\"http:\/\/e5hforensics.com\/wp-content\/uploads\/2023\/03\/protecting-your-cryptocurrency.png\" alt=\"Protecting Your Cryptocurrency\" class=\"wp-image-184\" style=\"border-radius:0px\" title=\"Protecting your Cryptocurrency\" srcset=\"\/wp-content\/uploads\/2023\/03\/protecting-your-cryptocurrency.png 372w, \/wp-content\/uploads\/2023\/03\/protecting-your-cryptocurrency-211x300.png 211w\" sizes=\"(max-width: 372px) 100vw, 372px\" \/><\/a><\/figure>\n\n\n\n<h6 class=\"wp-block-heading has-zeever-secondary-color has-text-color\" id=\"Protecting-your-Cryptocurrency\">Protecting your Cryptocurrency<\/h6>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-Elz31W\"><div class=\"guten-background-overlay\"><\/div><div class=\"sticky-wrapper\" data-id=\"Elz31W\"><div class=\"guten-column-wrapper\">\n<figure class=\"wp-block-image size-full is-resized\" id=\"The-Role-&amp;-Responsibilities-of-an-Expert-Witness\"><a href=\"https:\/\/e5hforensics.com\/wp-content\/uploads\/2023\/03\/The-Role-Responsibilities-of-an-Expert-Witness.pdf\"><img decoding=\"async\" width=\"472\" height=\"673\" src=\"http:\/\/e5hforensics.com\/wp-content\/uploads\/2023\/03\/Expert-Witness.png\" alt=\"The Role &amp; Responsibilities of an Expert Witness\" class=\"wp-image-187\" title=\"The Role &amp; Responsibilities of an Expert Witness\" srcset=\"\/wp-content\/uploads\/2023\/03\/Expert-Witness.png 472w, \/wp-content\/uploads\/2023\/03\/Expert-Witness-210x300.png 210w\" sizes=\"(max-width: 472px) 100vw, 472px\" \/><\/a><\/figure>\n\n\n\n<h6 class=\"wp-block-heading has-zeever-secondary-color has-text-color\" id=\"The-Role-&amp;-Responsibilities-of-an-Expert-Witness\">The Role &amp; Responsibilities of an Expert Witness<\/h6>\n<\/div><\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"k9x3JV\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-k9x3JV layout-boxed align-stretch\"><div class=\"guten-background-overlay\"><\/div><div class=\"guten-shape-divider guten-shape-divider-top\"><\/div><div class=\"guten-shape-divider guten-shape-divider-bottom\"><\/div><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-0aMBqn\"><div class=\"guten-background-overlay\"><\/div><div class=\"sticky-wrapper\" data-id=\"0aMBqn\"><div class=\"guten-column-wrapper\">\n<figure class=\"wp-block-image size-full is-resized\" id=\"-Preventing-Email-Bank-Transfer-Fraud-Preventing-Email-Bank-Transfer-Fraud\"><a href=\"https:\/\/e5hforensics.com\/wp-content\/uploads\/2023\/03\/Preventing-Email-Bank-Transfer-Fraud.pdf\"><img decoding=\"async\" width=\"496\" height=\"701\" src=\"http:\/\/e5hforensics.com\/wp-content\/uploads\/2023\/03\/Preventing-Email-Bank-Transfer-Fraud.png\" alt=\"Preventing Email Bank Transfer Fraud\" class=\"wp-image-186\" title=\" Preventing Email Bank Transfer Fraud Preventing Email Bank Transfer Fraud\" srcset=\"\/wp-content\/uploads\/2023\/03\/Preventing-Email-Bank-Transfer-Fraud.png 496w, \/wp-content\/uploads\/2023\/03\/Preventing-Email-Bank-Transfer-Fraud-212x300.png 212w\" sizes=\"(max-width: 496px) 100vw, 496px\" \/><\/a><\/figure>\n\n\n\n<h6 class=\"wp-block-heading has-zeever-secondary-color has-text-color\" id=\"Preventing-Email-Bank-Transfer-Fraud\">Preventing Email Bank Transfer Fraud<\/h6>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-pGP5Xx\"><div class=\"guten-background-overlay\"><\/div><div class=\"sticky-wrapper\" data-id=\"pGP5Xx\"><div class=\"guten-column-wrapper\">\n<figure class=\"wp-block-image size-full is-resized\" id=\"The-Skills-Needed-to-Become-a-Digital-Forensic-Investigator\"><a href=\"https:\/\/e5hforensics.com\/wp-content\/uploads\/2023\/03\/The-Skills-Needed-to-Become-a-Digital-Forensic-Investigator.pdf\"><img decoding=\"async\" width=\"500\" height=\"700\" src=\"http:\/\/e5hforensics.com\/wp-content\/uploads\/2023\/03\/The-Skills-Needed-to-Become-a-Digital-Forensic-Investigator.png\" alt=\"The Skills Needed to Become a Digital Forensic Investigator\" class=\"wp-image-191\" title=\"The Skills Needed to Become a Digital Forensic Investigator\" srcset=\"\/wp-content\/uploads\/2023\/03\/The-Skills-Needed-to-Become-a-Digital-Forensic-Investigator.png 500w, \/wp-content\/uploads\/2023\/03\/The-Skills-Needed-to-Become-a-Digital-Forensic-Investigator-214x300.png 214w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/figure>\n\n\n\n<h6 class=\"wp-block-heading has-zeever-secondary-color has-text-color\" id=\"The-Skills-Needed-to-Become-a-Digital-Forensic-Investigator\">The Skills Needed to Become a Digital Forensic Investigator<\/h6>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-zZ0dsY\"><div class=\"guten-background-overlay\"><\/div><div class=\"sticky-wrapper\" data-id=\"zZ0dsY\"><div class=\"guten-column-wrapper\">\n<figure class=\"wp-block-image size-full is-resized\" id=\"Making-Sense-of-Electronic-Evidence\"><a href=\"https:\/\/e5hforensics.com\/wp-content\/uploads\/2023\/03\/Making-Sense-of-Electronic-Evidence.pdf\"><img decoding=\"async\" width=\"492\" height=\"697\" src=\"http:\/\/e5hforensics.com\/wp-content\/uploads\/2023\/03\/Making-Sense-of-Electronic-Evidence.png\" alt=\"Making Sense of Electronic Data\" class=\"wp-image-192\" title=\"Making Sense of Electronic Evidence\" srcset=\"\/wp-content\/uploads\/2023\/03\/Making-Sense-of-Electronic-Evidence.png 492w, \/wp-content\/uploads\/2023\/03\/Making-Sense-of-Electronic-Evidence-212x300.png 212w\" sizes=\"(max-width: 492px) 100vw, 492px\" \/><\/a><\/figure>\n\n\n\n<h6 class=\"wp-block-heading has-zeever-secondary-color has-text-color\" id=\"Making-Sense-of-Electronic-Evidence\">Making Sense of Electronic Evidence<\/h6>\n<\/div><\/div><\/div>\n<\/div><\/section><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":170,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-182","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/pages\/182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/comments?post=182"}],"version-history":[{"count":18,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/pages\/182\/revisions"}],"predecessor-version":[{"id":942,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/pages\/182\/revisions\/942"}],"up":[{"embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/pages\/170"}],"wp:attachment":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/media?parent=182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}