OUR SERVICES
System Compromise Investigations
During 2015 - 2016 we have seen a significant rise in the incidence of Cryptolocker and Spear Phishing attacks, as well as the regular compromise of hosted systems.
​
Attackers have been able to identify and exploit weaknesses in business IT systems as well as the naivety of users, resulting in the substantial loss of data and money. This should prompt all businesses to reassess and test the security of their systems. All businesses should be examining access control, reviewing the need for two-factor financial sign-off and questioning the effectiveness of their continuity and backup systems.
CASE STUDIES
Legacy Contacts and Access to Social Media, Online Accounts, Computers & Phones.
Sadly, recent engagements have highlighted the difficulty next of kin experience in attempting to access the accounts and devices of loved ones that have been lost through sickness, suicide, or other tragic, unanticipated events. We are often asked on these occasions to access devices and accounts so that valuable digital content relating to the deceased, family or business matters can be recovered and retained by the family.
​
Email security: don’t let bandits in the back door
Cloud-based Office 365 has become one of the most common email platforms for small to mid-sized businesses — we see it every day. However, while Office 365 is a great option for businesses that don't want the responsibility of managing in-house email servers, it can also create a significant security risk to the business if it is implemented without appropriate security measures.
Spear Phishing Investigations
Cryptolocker Attacks
Theft of Intellectual Property (Confidential Information)
Business Solvency & Administration: Books & Records Preservation
One of the applications of Forensic IT is the capture of “books and records” when an Administrator or Liquidator is appointed over a distressed company. This capture of material ensures that the Administrator has all the available information he needs to investigate the business and recover funds for the creditors.
Falsification of Documents
Transactional Inquiries by Government Regulators
Australian Government Agencies - Search Warrants
Forensic IT has a history of assisting in the execution of warrants with several different Australian Government agencies. Including field managing, assisting coordination, triage and forensic acquisition of desktop computers, servers and mobile devices.