Forensic informatics

 COMPUTER FORENSICS

In case a company is a victim of a cybercrime, we are able to perform the necessary follow up and consulting to identify the events, their timeline and in some cases the perpetrator or perpetrators. In this exercise we do: Capture of digital evidence stored in devices applying chain of custody, complying with legal parameters, applying internationally accepted forensic protocols, digital security, forensic analysis, report generation and testimony as expert witnesses.

ADVANCED MALWARE ANALYSIS

The most used attack vector by cyber criminals against companies and individuals is malware; unfortunately, anti-malware tools are not always able to detect and/or contain the threats. We have technological tools such as sandboxes and expert analysts who are able to dissect the malware, understand its operation and generate corrective or disinfection mechanisms.

DATA RECOVERY

Information recovery from deteriorated or damaged storage devices, using internationally endorsed forensic methodologies in a laboratory equipped with the specialized infrastructure and tools for data recovery.