bg-clear

IT Forensics

An overview of our services

Presenting various examples that can be resolved through IT forensic investigations helps make the issue more tangible. We have therefore outlined our services by describing various practical cases that might be relevant for you.

Data theft or the passing on of data

Data theft or the passing on of data

If you suspect that an employee (or former employee) has illegally stolen company data, we can help secure and analyse the ‘footprints’ that prove that information has been sent by email or copied on to a flash drive.


Deception with regard to working hours

Deception with regard to working hours

If you suspect that employees are being deceptive about their working hours, we can support you to secure and evaluate the evidence for legal purposes.


Pornography at the workplace

Pornography at the workplace

If pornographic material is being viewed in the corporate network, or on employees’ PCs or smartphones, we can secure and analyse the evidence to convict perpetrators.


Illegal downloads

Illegal downloads

If claims are filed against your company by rightsholders or their legal counsel with respect to music or videos employees have illegally downloaded/uploaded, we help to reconstruct the action and take action against the offender.


Computer crime

Computer crime

If unauthorised third-parties have gained access to corporate data either using internal information or via malware hidden in an email attachment, we can secure the evidence and evaluate it to establish the facts.


Hacker attacks

Hacker attacks

If indications are growing that your company has been the victim of a hacker attack, we will support you in identifying and curbing the attack and in reconstructing it.


Delays in filing for insolvency

Delays in filing for insolvency

As an insolvency administrator, you need information about occurrences in the company up to the insolvency itself. We can trace deleted emails, Excel sheets and other documents and recover them.


Trojan encryption – Ransomware

Trojan encryption – Ransomware

If a gap in your security system has been exploited for an encryption attack, we will support you in analysing the attack and consult you on IT security.