Legacy Contacts and Access to Social Media, Online Accounts, Computers & Phones.
Sadly, recent engagements have highlighted the difficulty next of kin experience in attempting to access the accounts and devices of loved ones that have been lost through sickness, suicide, or other tragic, unanticipated events. We are often asked on these occasions to access devices and accounts so that valuable digital content relating to the deceased, family or business matters can be recovered and retained by the family.
Email security: don’t let bandits in the back door
Cloud-based Office 365 has become one of the most common email platforms for small to mid-sized businesses — we see it every day. However, while Office 365 is a great option for businesses that don't want the responsibility of managing in-house email servers, it can also create a significant security risk to the business if it is implemented without appropriate security measures.
Spear Phishing Investigations
Theft of Intellectual Property (Confidential Information)
Business Solvency & Administration: Books & Records Preservation
One of the applications of Forensic IT is the capture of “books and records” when an Administrator or Liquidator is appointed over a distressed company. This capture of material ensures that the Administrator has all the available information he needs to investigate the business and recover funds for the creditors.
Falsification of Documents
Transactional Inquiries by Government Regulators
Australian Government Agencies - Search Warrants
Forensic IT has a history of assisting in the execution of warrants with several different Australian Government agencies. Including field managing, assisting coordination, triage and forensic acquisition of desktop computers, servers and mobile devices.