OUR SERVICES
System Compromise Investigations
During 2015 - 2016 we have seen a significant rise in the incidence of Cryptolocker and Spear Phishing attacks, as well as the regular compromise of hosted systems.
Attackers have been able to identify and exploit weaknesses in business IT systems as well as the naivety of users, resulting in the substantial loss of data and money. This should prompt all businesses to reassess and test the security of their systems. All businesses should be examining access control, reviewing the need for two-factor financial sign-off and questioning the effectiveness of their continuity and backup systems.

excellence in digital forensics & cyber incident
response
FORENSIC IT
The ability of a business to respond to compromise of any of its systems, identify the source and the extent of the spread is critical to limiting the impact and cost.
Effectively responding to any compromise means engaging with competent and experienced people who know how to triage the event, preserve the evidence and allow remediation of business systems while the forensic investigation is taken offline.
That's where the decades of experience our team has makes all the difference.
