Digital Investigation & Computer Forensics
The misuse of electronic devices by anyone with ill intent can have devastating effects on individuals and businesses. Such perpetrators leave a digital trail in their wake. Stand up to them if you are victimised.
As the digital realm continues to embrace our personal and organisational space, misuse of data poses a real and growing threat.
Data can be amended, stolen or destroyed, and can be used for many unauthorised or illegal purposes. Misuse of electronic devices can cause unimaginable physical, reputational and financial damage.
With a digital investigation team in support, you can stand up to such threats. Our comprehensive digital investigation and computer forensic services focus on reclaiming lost value and mitigating your cyberthreats.
We provide you with a comprehensive range of investigation services and reports that include extraction and processing of supporting evidence. Our reports are acceptable as evidential reports in criminal and civil proceedings. They also assist in mitigation of the process to prevent future occurrences.
I THINK MY EMPLOYEE IS ACTING IN CONFLICT WITH MY COMPANY’S INTERESTS:
- COMMITTING FRAUD
- SOLICITING OR RECIEVING KICKBACKS
- FIXING PRICES AND COLLUDING WITH VENDORS
- SIPHONING BUSINESS AWAY
- LEAKING CONFIDENTIAL DATA, TRADE SECRETS
- HARASSING OTHER STAFF/CUSTOMERs
Misdeeds like these always leave a trail of digital evidence within the business IT environment. Our extensive range of digital investigation services uncover evidence of misconduct, fraud, corruption, information leakage or any other conflict situation.
I NEED TO PROTECT MY DATA WHEN STAFF LEAVE THE COMPANY
When an employee leaves your company, it’s easy for them to walk away with business-critical data like your customer/supplier/pricing lists, trade secrets, proprietary business processes and procedures, etc. Our data leakage prevention service ensures business critical data remains within your company.
I think someone is sabotaging our operations from the inside.
It can be incredibly disheartening if you suspect a current or previous employee is knowingly sabotaging your business. But if operations are disrupted, your output will be affected, and eventually you’ll be in even bigger trouble. Our investigations will help you put a stop to sabotage.
I HAVE A LEGAL DISPUTE AND MY DATA IS IN MY PHONE
Mobile phones are increasingly used for business communications. Business contacts, SMS, call records and messaging apps, such as WhatsApp and WeChat, are used in local and transnational business communications. When disputes occur, parties need to rely heavily on the highly volatile contents of such communications as proof. Through our mobile phone forensic services, we are able to help you extract, process and document such data to facilitate dispute resolution on your behalf.
I need to protect my personal data but my company’s IT usage policies are vague and include access to my personal data
If you’re worried that your employer’s vague IT policy includes access to and potential deletion of your personal data, we can help you protect what’s yours with our independent data image services.
MY BUSINESS OPERATIONS ARE TOO EXPANSIVE TO TRACK WHETHER EVERY BUSINESS ACTIVITY IS CONDUCTED FOR THE GOOD OF THE BUSINESS
Large businesses traversing multiple geographic locations continually face internal business risks. For example, it can be incredibly challenging to oversee all procurement activity across multiple sites and ensure non-competitive behaviour by procurement staff, end-users and vendors.
Through our business integrity programme, we are able to flush out procurement staff, end-users and vendors engaged in anti-competitive behaviours and those who are responsible for deliberate inflation of business costs through fraud, non-delivery, bid-rigging and cartel activities.
In this instance, our post-investigation mitigation service stops the money leak by correcting processes and ensuring a pro-competitive procurement culture is instilled and practised.
WE HAVE BEEN HACKED … WHAT’S NEXT?
The tendency is to put all your focus on preventing cyberattacks – but what happens if one actually occurs? What do you do when your data is compromised or your operations are stalled? Our post-intrusion investigation service pursues the intruder/culprit while your disaster recovery and business continuity teams restore your operations.