top of page
OUR SERVICES
System Compromise Investigations
During 2015 - 2016 we have seen a significant rise in the incidence of Cryptolocker and Spear Phishing attacks, as well as the regular compromise of hosted systems.
Attackers have been able to identify and exploit weaknesses in business IT systems as well as the naivety of users, resulting in the substantial loss of data and money. This should prompt all businesses to reassess and test the security of their systems. All businesses should be examining access control, reviewing the need for two-factor financial sign-off and questioning the effectiveness of their continuity and backup systems.
Search

Safeguarding Intellectual Property – The Role of Digital Forensics in Preventing and Investigating IP Theft for Australian Businesses
This webinar explored the crucial role of digital forensics in protecting intellectual property (IP) for Australian businesses. Experts...
Mar 61 min read

Sponorship of the Legal Innovation & Tech Fest
🚨 Exciting Announcement! 🚨 We are proud to announce that we are co-Cyber Security sponsors with Infotrust (Spirit) at the LEGAL...
Mar 61 min read


Spirit Technologies acquires Forensic IT to enhance Digital Forensics and Incident Response services across private and public sectors
Spirit Technology Solutions acquires Forensic IT, Australia's leading provider of cutting-edge incident response and digital forensics...
Aug 27, 20244 min read


The Digital Detective's Toolkit: Comparing Validation, Verification, and Methodology in Science and Digital Forensics
Author - Ash Harrison | Senior Digital Forensic Analyst For someone who works in digital forensics, my background is rather unique. I...
Jul 22, 20243 min read


Unlocking the Truth: Mobile Device Forensics in Modern Investigations
Author - Ash Harrison | Senior Digital Forensic Analyst In this digital age, smartphones and tablets have become repositories of personal...
Jul 10, 20242 min read


Outsmarting Shadows in the Inbox: a Cautionary Tale of Digital Deception
Author - Carlos Mejia-Hernandez | Senior Digital Forensic Analyst In the world of cyber threats, an organisation recently encountered a...
Mar 27, 20242 min read


Device Hardening Explained: Strengthening Cybersecurity Foundations
Author - Ash Harrison | Senior Digital Forensic Analyst In the ever-evolving landscape of cybersecurity, where adversaries continuously...
Mar 12, 20243 min read


Ransomware Series (Part 5) : What Personally Identifiable Information (PII) Does our Business Have?
In this, the last of Ransomware blog series, we consider the difficulty in understanding the nature and extent of the Personally...
Feb 22, 20242 min read


Ransomware Series (Part 4) : Interaction with the Threat Actor
Ransomware attacks have become a common threat for organisation's of all sizes where threat actors will demand payment in exchange for...
Feb 12, 20243 min read


Ransomware Series (Part 3) - Identifying and Responding to Data Theft in Your Business
In the aftermath of a ransomware attack, businesses grapple with the unsettling question of potential data theft, transforming clients...
Feb 1, 20242 min read


Ransomware Series (Part 2) - How did they get in?
In the ever-evolving landscape of cybersecurity, we've recently witnessed a surge in cyber threats, with compromised user credentials...
Jan 19, 20242 min read


Ransomware Series (Part 1) - Pay or Don't Pay?
With ransomware now one of the most predominant threats to business, a question we're often asked during the engagement is whether to pay...
Jan 10, 20242 min read


The Power of Covert Acquisitions in Forensic IT Investigations
In the world of digital forensics, our work often involves uncovering the truth while navigating a delicate balance between evidence...
Dec 9, 20232 min read


Choosing a Digital Forensic Analyst Over an IT Consultant: Why It Matters
In today's digital age, businesses and individuals alike are increasingly reliant on technology to store, process, and transmit...
Dec 2, 20233 min read


Ransomware Attacks: Interaction with the Threat Actor
Ransomware attacks have become a common threat for organisations of all sizes, where threat actors will demand payment in exchange for...
Mar 16, 20233 min read


Ransomware Attacks: Identifying and Responding to Data Theft in Your Business
Dealing with the aftermath of a ransomware attack often involves determining whether or not data has been stolen. If client personal...
Mar 7, 20232 min read


Ransomware - How Did They Get In?
A ransomware attack is a type of cyberattack in which a hacker uses malicious software (known as ransomware) to encrypt the victim's...
Feb 23, 20232 min read


The Cost of Notifiable Data Breaches
Since the implementation of mandatory reporting of Notifiable Data Breaches (NDB) in 2018 we have had a number of opportunities to see...
Jan 26, 20232 min read


Have you been “pwned”?
Many of the online security breaches we have investigated over the last 12 months raise doubts about the integrity of the username and passw
Jan 26, 20231 min read


Slam the window on IP theft
Microsoft’s most up-to-date operating system, Windows 10, brings with it some quirks that business operators need to be aware of – particula
Jan 26, 20232 min read
Anchor 1
Anchor 2
Anchor 3
Anchor 4
bottom of page