Computer Forensics & IT Security Services
“Business today is dominated by the computer, both as a working tool and as means of international communication; it is also the fastest growing area of white-collar crime”
Our computer forensics team have extensive experience in the handling and analysis of computer data evidence to support criminal convictions, or as part of an intelligence gathering exercise.
Corporate espionage, fraud and counterfeiting all involve computer technology at some stage and it is a constant battle to stay up-to-date with the latest threats and vulnerabilities.
Our International Intelligence computer forensics team is headed by Eric Thompson, a true professional with many years of experience with high level US Government and military computer systems and networking. Eric has managed and overseen many projects, from those with London law firms through to large corporate clients in North America.
Over the past two years we have seen a huge rise in not only computer hacking, but also in the hacking of websites.
Our anti-hacking services cover:
- Prevention of virus attacks
- High level virus scan
- Malware detection
- Vulnerability assessment
- Blacklist and reputation monitoring
Blacklisting by Google is highly damaging for the reputation of any company. Our team of experts are able to analyse malware affected websites and online stores and clear any infection. In many cases this can be done quite quickly, limiting the downtime of your website and any damage to your reputation.
As part of our counter espionage services, our computer forensics team are able to trace weaknesses within your network and identify any areas that have been subject to the attention of hackers, or those carrying out subversive activities against your organisation. We recommend the use of high-specification 256-Bit data encryption systems as an added security measure and are able to supply this system with technical backup.
Our computer forensics and IT security services cover:
- Hidden access, deleted or password protected files
- Finding files/records from vast fields of data
- Establishing unauthorised transmission of information to others
- Interrogating ex-employees workstations/laptops
- System integrity surveys
- Monitoring internal and external traffic
- 256-Bit encryption systems
- Email interception
Post investigation, our team can produce sworn affidavits to accompany any recovered data and also act as Expert Witnesses in presenting any complex technical evidence to Court or Tribunal.
We maintain the integrity of any evidence, in accordance with the Police and Criminal Evidence Act 1984 (PACE), by ensuring that the computer data is not altered, thus enabling us to produce a forensically sound, true mirror image of that data.