Skip to main content

Digital Forensics

Increasingly, evidence of wrongdoing perpetrated against organisations will be found on digital devices. This may occur through the actions of sophisticated cybercriminals or ordinary employees. Defensibly preserving and analysing the evidence required to support cases is becoming progressively more complex as the divisions between the corporate estate, the cloud and personal domain become increasingly blurred.

With our team of specialists, clients will benefit from rapid investigation of issues and crises allowing them to find answers and take action.

We offer Data Collection and Preservation services across a wide range of digital assets and cloud data sources. We use industry-leading forensic software and hardware to acquire data rapidly while preserving its integrity.

Our methodologies and controls are designed to meet courtroom acceptance criteria, and all digital evidence is handled in line with industry best practices in our purpose built secure Digital Forensic lab.

Some data sources from which we routinely collect data include:

  • Cloud-based repositories
  • Mobile devices such as cell phones and tablets
  • Hard-drive and portable storage media
  • Network devices
  • Computers including servers
  • Memory content from live systems (RAM)
  • Archived and historical data such as backup data in off-site or on-site locations, network-attached storage devices, storage arrays and tapes
  • Corporate file-sharing and email servers
  • Virtual environments
  • Databases and software applications
 

Our Digital Forensics professionals can provide actionable insights into forensic investigations related to a wide variety of cases such as fraud, corruption or misconduct cases through the examination of digital artifacts.

By focusing on file metadata and system artifacts, we can potentially uncover trails of device and user activity that could assist in the context of a forensic investigation or review. Activities may include, but are not limited to:

  • Device and user activity analysis and timelining
  • Data recovery and deletion analysis
  • Web history analysis
  • Document authentication 
  • Identifying use of external media devices
  • Advanced searches for files, information and applications and their traces