top of page
OUR SERVICES
System Compromise Investigations
During 2015 - 2016 we have seen a significant rise in the incidence of Cryptolocker and Spear Phishing attacks, as well as the regular compromise of hosted systems.
Attackers have been able to identify and exploit weaknesses in business IT systems as well as the naivety of users, resulting in the substantial loss of data and money. This should prompt all businesses to reassess and test the security of their systems. All businesses should be examining access control, reviewing the need for two-factor financial sign-off and questioning the effectiveness of their continuity and backup systems.
Search


Digital Forensic and Incident Response Services Guide 2025
Author: Josh Kither Executive Summary Our forensic IT services have evolved from a background of providing basic services to Liquidators and Administrators through our start in a second tier firm specialising in corporate recovery, corporate advisory, forensic accounting and forensic IT for the ten year period from 2003 to 2013. From 2013 we moved to a more independent position in Forensic IT, where we were able to provide services to a broader range of clients including a
Dec 9, 20255 min read


Ransomware vs. Extortionware: What’s the Real Threat?
Author: Josh Kither In today’s cybersecurity landscape, few threats are as disruptive as ransomware and extortionware. While both tactics are used by cybercriminals to pressure organisations into paying hefty ransoms, their methods and impacts differ in ways that are increasingly important to understand. The Core Difference Ransomware is the more traditional form of attack: threat actors encrypt critical business data and demand payment for its release. Operations grind to a
Oct 30, 20252 min read


Forensic IT Expands On-Site Presence in Queensland: Strengthening National Cyber Incident Response & Forensic IT Capabilities
As cyber threats continue to evolve, the need for rapid, expert-led incident response has never been more critical. Forensic IT, a trusted national provider of digital forensics and cyber incident response services, is proud to announce the expansion of its on-site presence in Queensland, a strategic move that enhances its ability to deliver localised, high-impact support across Australia. A National Provider with Local Reach Forensic IT has long been recognised for its deep
Oct 29, 20252 min read


Considerations to Keep in Mind During a Ransomware Incident
To read Forensic IT's blog on the "Considerations to keep in mind during a ransomware incident", please click here -...
Jul 9, 20251 min read


Exposing Internal Fraud Through Expert Digital Forensics
Internal fraud poses significant risks to businesses, leading not only to substantial financial losses but also severe reputational...
May 28, 20253 min read


Safeguarding Intellectual Property – The Role of Digital Forensics in Preventing and Investigating IP Theft for Australian Businesses
This webinar explored the crucial role of digital forensics in protecting intellectual property (IP) for Australian businesses. Experts...
Mar 6, 20251 min read


Sponorship of the Legal Innovation & Tech Fest
🚨 Exciting Announcement! 🚨 We are proud to announce that we are co-Cyber Security sponsors with Infotrust (Spirit) at the LEGAL...
Mar 6, 20251 min read


Spirit Technologies acquires Forensic IT to enhance Digital Forensics and Incident Response services across private and public sectors
Spirit Technology Solutions acquires Forensic IT, Australia's leading provider of cutting-edge incident response and digital forensics...
Aug 27, 20244 min read


The Digital Detective's Toolkit: Comparing Validation, Verification, and Methodology in Science and Digital Forensics
Author - Ash Harrison | Senior Digital Forensic Analyst For someone who works in digital forensics, my background is rather unique. I...
Jul 22, 20243 min read


Unlocking the Truth: Mobile Device Forensics in Modern Investigations
Author - Ash Harrison | Senior Digital Forensic Analyst In this digital age, smartphones and tablets have become repositories of personal...
Jul 10, 20242 min read


Outsmarting Shadows in the Inbox: a Cautionary Tale of Digital Deception
Author - Carlos Mejia-Hernandez | Senior Digital Forensic Analyst In the world of cyber threats, an organisation recently encountered a...
Mar 27, 20242 min read


Device Hardening Explained: Strengthening Cybersecurity Foundations
Author - Ash Harrison | Senior Digital Forensic Analyst In the ever-evolving landscape of cybersecurity, where adversaries continuously...
Mar 12, 20243 min read


Ransomware Series (Part 5) : What Personally Identifiable Information (PII) Does our Business Have?
In this, the last of Ransomware blog series, we consider the difficulty in understanding the nature and extent of the Personally...
Feb 22, 20242 min read


Ransomware Series (Part 4) : Interaction with the Threat Actor
Ransomware attacks have become a common threat for organisation's of all sizes where threat actors will demand payment in exchange for...
Feb 12, 20243 min read


Ransomware Series (Part 3) - Identifying and Responding to Data Theft in Your Business
In the aftermath of a ransomware attack, businesses grapple with the unsettling question of potential data theft, transforming clients...
Feb 1, 20242 min read


Ransomware Series (Part 2) - How did they get in?
In the ever-evolving landscape of cybersecurity, we've recently witnessed a surge in cyber threats, with compromised user credentials...
Jan 19, 20242 min read


Ransomware Series (Part 1) - Pay or Don't Pay?
With ransomware now one of the most predominant threats to business, a question we're often asked during the engagement is whether to pay...
Jan 10, 20242 min read


The Power of Covert Acquisitions in Forensic IT Investigations
In the world of digital forensics, our work often involves uncovering the truth while navigating a delicate balance between evidence...
Dec 9, 20232 min read


Choosing a Digital Forensic Analyst Over an IT Consultant: Why It Matters
In today's digital age, businesses and individuals alike are increasingly reliant on technology to store, process, and transmit...
Dec 2, 20233 min read


Ransomware Attacks: Interaction with the Threat Actor
Ransomware attacks have become a common threat for organisations of all sizes, where threat actors will demand payment in exchange for...
Mar 16, 20233 min read
Anchor 1
Anchor 2
Anchor 3
Anchor 4
bottom of page