top of page
OUR SERVICES
System Compromise Investigations
During 2015 - 2016 we have seen a significant rise in the incidence of Cryptolocker and Spear Phishing attacks, as well as the regular compromise of hosted systems.
Attackers have been able to identify and exploit weaknesses in business IT systems as well as the naivety of users, resulting in the substantial loss of data and money. This should prompt all businesses to reassess and test the security of their systems. All businesses should be examining access control, reviewing the need for two-factor financial sign-off and questioning the effectiveness of their continuity and backup systems.
Search


Aug 27, 20244 min read
Spirit Technologies acquires Forensic IT to enhance Digital Forensics and Incident Response services across private and public sectors
Spirit Technology Solutions acquires Forensic IT, Australia's leading provider of cutting-edge incident response and digital forensics...


Jul 22, 20243 min read
The Digital Detective's Toolkit: Comparing Validation, Verification, and Methodology in Science and Digital Forensics
Author - Ash Harrison | Senior Digital Forensic Analyst For someone who works in digital forensics, my background is rather unique. I...


Jul 10, 20242 min read
Unlocking the Truth: Mobile Device Forensics in Modern Investigations
Author - Ash Harrison | Senior Digital Forensic Analyst In this digital age, smartphones and tablets have become repositories of personal...


Mar 27, 20242 min read
Outsmarting Shadows in the Inbox: a Cautionary Tale of Digital Deception
Author - Carlos Mejia-Hernandez | Senior Digital Forensic Analyst In the world of cyber threats, an organisation recently encountered a...


Mar 12, 20243 min read
Device Hardening Explained: Strengthening Cybersecurity Foundations
Author - Ash Harrison | Senior Digital Forensic Analyst In the ever-evolving landscape of cybersecurity, where adversaries continuously...


Feb 22, 20242 min read
Ransomware Series (Part 5) : What Personally Identifiable Information (PII) Does our Business Have?
In this, the last of Ransomware blog series, we consider the difficulty in understanding the nature and extent of the Personally...


Feb 12, 20243 min read
Ransomware Series (Part 4) : Interaction with the Threat Actor
Ransomware attacks have become a common threat for organisation's of all sizes where threat actors will demand payment in exchange for...


Feb 1, 20242 min read
Ransomware Series (Part 3) - Identifying and Responding to Data Theft in Your Business
In the aftermath of a ransomware attack, businesses grapple with the unsettling question of potential data theft, transforming clients...


Jan 19, 20242 min read
Ransomware Series (Part 2) - How did they get in?
In the ever-evolving landscape of cybersecurity, we've recently witnessed a surge in cyber threats, with compromised user credentials...


Jan 10, 20242 min read
Ransomware Series (Part 1) - Pay or Don't Pay?
With ransomware now one of the most predominant threats to business, a question we're often asked during the engagement is whether to pay...


Dec 9, 20232 min read
The Power of Covert Acquisitions in Forensic IT Investigations
In the world of digital forensics, our work often involves uncovering the truth while navigating a delicate balance between evidence...


Dec 2, 20233 min read
Choosing a Digital Forensic Analyst Over an IT Consultant: Why It Matters
In today's digital age, businesses and individuals alike are increasingly reliant on technology to store, process, and transmit...


Mar 16, 20233 min read
Ransomware Attacks: Interaction with the Threat Actor
Ransomware attacks have become a common threat for organisations of all sizes, where threat actors will demand payment in exchange for...


Mar 7, 20232 min read
Ransomware Attacks: Identifying and Responding to Data Theft in Your Business
Dealing with the aftermath of a ransomware attack often involves determining whether or not data has been stolen. If client personal...


Feb 23, 20232 min read
Ransomware - How Did They Get In?
A ransomware attack is a type of cyberattack in which a hacker uses malicious software (known as ransomware) to encrypt the victim's...


Jan 26, 20232 min read
The Cost of Notifiable Data Breaches
Since the implementation of mandatory reporting of Notifiable Data Breaches (NDB) in 2018 we have had a number of opportunities to see...


Jan 26, 20231 min read
Have you been “pwned”?
Many of the online security breaches we have investigated over the last 12 months raise doubts about the integrity of the username and passw


Jan 26, 20232 min read
Slam the window on IP theft
Microsoft’s most up-to-date operating system, Windows 10, brings with it some quirks that business operators need to be aware of – particula


Jan 26, 20232 min read
Securing Office 365
Cloud-based Office 365 has become one of the most common email platforms for small to mid-sized businesses — we see it every day. However,


Jan 26, 20231 min read
'New Age' Anti Virus Software
Recently, the Forensic IT team was called out to assist two businesses that were the victims of fraudulent transactions totalling several mi
Anchor 1
Anchor 2
Anchor 3
Anchor 4
bottom of page