OUR SERVICES
System Compromise Investigations
During 2015 - 2016 we have seen a significant rise in the incidence of Cryptolocker and Spear Phishing attacks, as well as the regular compromise of hosted systems.
​
Attackers have been able to identify and exploit weaknesses in business IT systems as well as the naivety of users, resulting in the substantial loss of data and money. This should prompt all businesses to reassess and test the security of their systems. All businesses should be examining access control, reviewing the need for two-factor financial sign-off and questioning the effectiveness of their continuity and backup systems.
CASE STUDY
Transactional Inquiries
Significant business transactions can sometimes be examined by Government regulators such as the Australian Competition and Consumer Commission (ACCC) and the Australian Securities and Investments Commission (ASIC).
​
Forensic IT has undertaken work for both business and Government regulators in such inquiries, typically relating to the identification of electronic data repositories (such as email databases, email archives, backups and shared-file directories), collection and processing of the data and discovering documents relevant to the inquiry based on criteria provided by the client.
​
This type of engagement usually involves reviewing email and documents dating back over substantial periods of time, often numbering in their millions, in an effort to identify those relevant to the transaction.
​
Once we collect the broader set of data we process it in a document review (eDiscovery) platform and apply a set of criteria to identify a smaller more relevant set of documents.
This can also include applying criteria to identify and remove privilege or confidential business information.
​