• left-quotesWe had one of our employees steal data from the company and gave it to one of our competitors...”

  • left-quotesSomeone has falsely accused me and my business of all kinds of illicit acts, damaging the company’s reputation and I want to know who was behind the profile to pursue legal action...”

  • left-quotesSomeone in our company deliberately deleted sensitive data, and we needed to identify what was deleted, when and by whom...”
  • left-quotesOur systems administrator used the datacenter servers to mine cryptocurrency over a period of several months, and we needed to have his devices investigated to pursue legal action...”
  • left-quotesAn employee leaked a confidential recording of one of our shareholder meetings causing a public relations disaster...”

We are offering a discount on all data recovery and digital forensic investigations as a direct result of the current unrest in South Africa.

This offer includes digital forensic investigations and data recovery from dropped, fire and water damaged data and CCTV footage storage devices, CCTV footage format conversion (from a proprietor to a standard video format), video clean-up and enhancement.

Digital Forensic Investigations South Africa

digital forensicsTypical digital forensic investigation scenarios:-

  • An employee or ex-employee:
    • exfiltrate emails, intellectual property or other confidential information;
    • deletes intellectual property, important or confidential information;
    • sells your products or services on the side;
    • makes fraudulent payments or other expense claims;
    • compromises your digital security by visiting harmful websites;
    • manipulates or otherwise alters digital records;
    • misuses company assets by storing child pornography etc. on the servers/computers and deletes the evidence;
    • hack confidential user accounts etc.
  •  External cybercrime where a perpetrator:
    • uses your company identity for nefarious purposes;
    • gains access to your systems:
      • by performing an SQL, brute force, DOS or other forms of attack;
      • using identity theft, social engineering, phishing, spoofing or by other means.

What can you expect from a digital forensic investigation?

We will endeavour to extract, recover and analyse digital evidence from all electronic data storage devices that may have been used to determine and report the who, what, when, where, why and how of an incident, e.g.:-

  • Who was using the device?
    • Who opened, executed, emailed, copied or deleted the data - to whom was the data sent, who else was involved or had access to the device or data?
  • What happened?
    • What data was accessed, copied, sent, printed, screen captured, deleted, obfuscated, password protected or encrypted - what applications or devices were used, what programs were installed, deleted or uninstalled, what other data could have been affected, what websites, social media, online communication, forums, file storage sites etc. were visited, what was posted or uploaded, what was the sequence of the events?
  • When did this happen?
    • When was the data accessed, copied, sent, printed, screen captured or deleted - when were the applications or devices used, installed, deleted or uninstalled?
  • Where did this take place?
    • Where else is the data located, where was the data sent, uploaded, copied or printed to? 
  • Why did it happen?
    • Are there any correspondence, metadata or activity logs that could assist in answering this question? 
  • How was it done?
    • How was the data accessed or compromised, how did the data get on or off the device, how did the person communicate with other people?

Related Services:

See Also
Why do storage devices fail and other causes of data loss?
Data Recovery vs Forensic Data Recovery vs Forensic Investigation

Tags: Digital Forensics Computer Forensics Data Forensics Electronic Forensics Digital Search And Seizure Digital Evidence Digital Forensic Investigation Data Message Forensics Electronic Evidence Forensic Duplicates Intellectual Property Theft Data Theft