Incident Response, Digital Forensics and Litigation Support
Most organizations wait till an incident strikes, with the critical assets
are under attack when they take information security seriously
OVERVIEW
How prepared is your team when an incident strikes?
Incident Response, Digital Forensics, and Litigation Support
We give your organization the right skills and expertise you need to not only respond to the incidents, thwart attackers and stop them in their tracks, but also assist your organization during the entire process as well as hands-on remediation measures.
We conduct a thorough digital forensics investigation to give a detailed account of how the incident occurred, and the perpetrators, and where necessary we give your organization legal support as experts witness in a court of law to ensure the criminals are brought to book.
Computer forensics involves the extraction and analysis of Electronically Stored Information (ESI) from devices such as desktop computers, laptops, tablets, and hard drives.
Our team of Certified and Experienced Digital Forensics and Incident Response Experts have vast experience working with different advanced technologies to solve complex incidents and allow your organisation to:
- Access swift incident response support whenever there is a breach or security-targeted cyber attack
- Access Practical and Hands-on remediation support to prevent future incidents
- Work with an experienced team of incident responders, experienced digital forensics professionals, and litigation experts
WE INVESTIGATE
Common Types of Incidents
Intellectual property theft
This involves theft of trade secrets or other sensitive information.
Financial Crime
This can range from Business email Compromise (BEC), Payment card data theft, Extortion and Ransomware.
Targeted Destructive Attacks
These could be attacks with the intention of disrupting and destruction the organization’s information systems.
Personally Identifiable information (PII)
Personally identifiable information, or PII, is any data that could potentially be used to identify a particular person. Examples include a full name, Social Security number, driver’s license number, bank account number, passport number, and email address.
Insider Threats
Insider threats are people – whether employees, former employees, contractors, business partners, or vendors – with legitimate access to an organization’s networks and systems who deliberately exfiltrate data for personal gain or accidentally leak sensitive information.
Collection and preservation
Once the electronic information has been identified, it’s preserved to protect any evidence from being altered or destroyed and collected for further review.
Processing
The processing and filtering phase prepares the information for analysis, performing a number of tasks including extracting files from folders and deleting meaningless system data.
Analysis
The content of the information is studied for key topics, people and timelines critical to the case.
Production
The evidence is then delivered in a format that coincides with e-discovery best practices and regulations.
Review
The information is evaluated to distinguish relevant and non-relevant document.
Have you experienced a breach?
Get immediate incident response assistance
Call: +254 (02) 515 4097 (KE) • +250 787 856 970 (RW) • +44 7810 402477 (UK) • +267 76 407 313 (BW)