If your IT systems are under attack, or you have just been targeted you have two choices - perform a forensic assessment or an incident response engagement.
If you are looking for absolute proof to launch criminal proceedings, win a legal case or just want to find out who is attacking you, then use forensic assessment. This is generally a larger project requiring more time and investment.
If you choose forensic assessment, it is important to leave things exactly “as is” and contact us immediately. The process and evidence trails need to be precise. We then use the latest in forensic discovery tools, cutting edge technology and investigative know-how to examine any of the following:
- Theft of sensitive business data, customer records, IP and trade secrets.
- Fraud or corrupt conduct.
- Threats, terrorism or extortion.
- Identity theft.
- Deletion of sensitive business data and intelligence.
- Money laundering.
- Email abuse and internet misuse.
Alternatively if you just want to get back up and running again and minimise your downtime, use incident response. We can help you contain the attack, limit the damage and get back to business.
To minimise the impact, our best advice is to be prepared. Talk to us about designing and building your incident response plan.