OUR SERVICES
System Compromise Investigations
During 2015 - 2016 we have seen a significant rise in the incidence of Cryptolocker and Spear Phishing attacks, as well as the regular compromise of hosted systems.
​
Attackers have been able to identify and exploit weaknesses in business IT systems as well as the naivety of users, resulting in the substantial loss of data and money. This should prompt all businesses to reassess and test the security of their systems. All businesses should be examining access control, reviewing the need for two-factor financial sign-off and questioning the effectiveness of their continuity and backup systems.
CASE STUDY
Falsification of Documents
The authenticity of documents (both electronic and hard copy) can sometimes be called into question in legal disputes.
​
Often this type of matter requires the business systems where the documents were created to be investigated for forensic artefacts that support (or otherwise) that the documents were created when they are claimed to have been. This can include understanding the history of the business systems over the period of time in question and forming an expert opinion about the likelihood of recovering forensic artefacts.
​
Other matters can be more closely focused on confirming the date of a document's creation or modification through analysis of the metadata of the electronic document.
​