Crimes targeting computer networks and hand-held devices are now commonplace. Protecting your network and data against Viruses, Denial-of-service attacks, Malware, Cyber stalking and Identity theft are just some of the services we offer.
These practices are recommended by the International Association of Computer Investigative Specialists, (IACIS) and the Computer Analyses and Response Team, (CART), of the Federal Bureau of Investigation. Using these methods in our forensic examination, we are able to uncover key pieces of information, even data that is protected by encryption. Additionally, we can often recover previously hidden, protected and deleted data. At the conclusion of your initial consultation, you will be assigned a forensic examiner who will work with you from start to finish.
By the Numbers-What to expect by initiating a forensic data investigation:
Contact us toll free (888) 808-9119 for your FREE Consultation. Any delay in identifying and preserving digital evidence that is vulnerable to spoilage or tampering can be costly! Contact us early to discuss your needs and see how ISS-DFS can help you – again, our consultations are free!
Engagement Letter After discussing the details of the desired examination, we will prepare an engagement letter outlining the scope of our services and estimated cost.
Locating the Data We work with the client, their IT department and legal team to identify and locate responsive data.
Acquiring the Data We begin the process of acquiring the data by making a forensic image of the entire media. A write-protected device prevents contamination of the evidence during the imaging process. The result is a bit stream or “bit by bit” copy of the media without any changes to the original. We verify that the copy is exact, preserve the media and never conduct any analysis on the original. We use live acquisition tools to image network data and capture volatile evidence while a computer or network is still running.
Reporting The results of the analysis and searches are recorded and presented in a detailed written report. We document the processes used to obtain the evidence and we produce the evidence in written form or copied to a digital file.
Presentation and Expert Testimony In the event that a matter proceeds to litigation, ISS-DFS will provide expert testimony and present our findings in a manner that juries can understand.
Take our FREE Security Risk Assessment to see your workplace risk score in under 10 minutes!