Computer Forensics & IT Security Services
“Business today is dominated by the computer, both as a working tool and as means of international communication, it is also the fastest growing area of white-collar crime”
Our computer forensics team have extensive experience in the handling and analysis of computer data evidence to support crimina convictions or as part of an intelligence gathering exercise.
Corporate espionage, fraud and counterfeiting all involve computer technology at some stage and it is a constant battle to stay up to-date with the latest threats and vulnerabilities.
International Intelligence Computer forensics team is headed by Eric Thompson, a true professional with many years of experience with high level of US Government and military computer systems and networking. Eric has managed and overseen projects for London law firms through to large corporate clients in North America.
Over the past two years we have seen a huge rise in not only computer hacking, but also in the hacking of websites.
Our Anti-hacking services cover:
- Prevention of virus attacks
- High level virus scan
- Malware Detection
- Vulnerability Assessment
- Blacklist and Reputation monitoring
Blacklisting by Google is highly damaging for the reputation of any company. Our team of experts are able to analyse malware affected websites and on-line stores and clear any infection. In many cases this can be done quite quickly, limiting the downtime of your website and damage to reputation.
As part our of counter espionage services, our computer forensics team are able to trace weaknesses within your network and identify any areas that have been subject to the attention of hackers or those carrying out subversive activities against your organisation. We recommend the use of high-specification 256 Bit data encryption systems as an added security measure, and are able to supply this system with technical backup.
Our Computer Forensics and IT security services cover:
- Hidden access, deleted or password protected files
- Find files/records from vast fields of data
- Establish unauthorised transmission of information to others
- Interrogate ex-employees workstations/laptops
- System integrity surveys
- Monitor internal and external traffic
- 256 Bit encryption systems
- Email interception
Post investigation, our team can produce sworn affidavits to accompany any recovered data and also act as Expert Witnesses in presenting any complex technical evidence to Court or Tribunal.
We maintain the integrity of any evidence, in accordance with the Police and Criminal Evidence Act 1984 (PACE), by ensuring that the computer data is not altered, thus enabling us to produce a forensically sound true mirror image of that data.