March 7, 2021
Computer Forensics


Computer forensics is an area where the main objectives are:
- securing and analysing evidence on digital media and within all IT assets,
- detection of cases and causes of burglary, leakage, theft and destruction of data, disloyal behaviour of employees and external entities.
Activities carried out within the scope of computer forensics focus on, among others, securing evidence, data recovery, identification and analysis of information, and preparation of an appropriate expert opinion for investigative audit or criminal or court proceedings.
The added value of our investigative computing services is to involve our entire team in a specific issue. It gives the possibility of a comprehensive look at a given case, not only for the indicated evidence, but also:
- searching for and using alternative and non-obvious sources of evidence;
- in electronic and analogue form;
- giving opinions on trust relationships with specific employees and contractors;
- legislative support;
- cooperation with law enforcement agencies and government CERT teams.
We also conduct preventive actions in computer forensics, such as monitoring of key employees’ activities or processes in the company to minimise threats from espionage or economic sabotage.
Read more:
March 7, 2021
CyberPrevent Solutions – Managed Security Service Provider (MSSP)
To stay ahead of cyberattacks’ dangers, we have developed CyberPrevent Solutions – fully managed security services. We will provide your company with 24-hour technical support to protect against cyber threats, and you will be able to take care of what is essential, namely running your business. Security is a 24/7 task, but it does not […]
March 7, 2021
Incident Response 24/7, SOCS, IR, SOARS
First of all, we help companies prepare for an incident. We react to eliminate the effects of an undesirable event. As part of proactive services related to incident management, we offer: modelling and implementation as well as auditing technological and organisational solutions as part of incident management; assessment of the maturity of teams within the […]
March 7, 2021
Counteracting economic espionage
Business relies on trust. However, it is useful when this trust is also supported by appropriate organisational and technological mechanisms to react if someone wants to abuse the trust relationship. Our services make it possible to detect leakage attempts and data theft by co-workers, employees substituted by unfair competition. We have experience in analysing and […]