Technology will continue to evolve, making cyber crime an ever present and changing reality, which is not at all avoidable. Simultaneously, there are continued opportunities for illegal activities which can be carried out in a matter of millisecond from remote geographical distance.
Our computer forensics services involve the safeguarding, detection, extraction and documentation of computer evidence stored in the form of magnetically, optically, or electronically stored media.
Our consultants with vast experience and knowledge help the organizations to identify and get valid evidences from the digital fingerprints of fraud cases, identity theft, and embezzlement.
Our consultants can perform both offline and online analyses as per the requirement:
Offline Analysis
An offline analysis can be done when our investigator powers down the computer and removes it from the network. Our investigator creates an exact copy of the computer’s hard drive to ensure that the files remained unchanged, and ensure all evidence is collected.
Online Analysis
An online analysis can be done when there are occasions it is impossible to power down a computer, requiring an online analysis. For instance, management may not permit the shutdown of a company’s only e-commerce server. In this circumstance our investigator will gather as much evidence as possible while the system remains running and connected to a network.
Our approach involves the following steps:
Our computer forensics procedures can be distilled into three major components:
Executive and Technical Report which includes: