Image

Employee Misuse/Misconduct Investigations

CryptoForensics’ Misuse Investigations focus on review of system users who have been suspected or accused of violating a client’s policies and acceptable use procedures. CryptoForensics will build a profile of the user in question and help the client to determine actions taken by the user under investigation. This investigation can be tailored to meet virtually any circumstances and can help facilitate the litigation process by either clearing or confirming a particular action.

Following this investigation, a detailed report on forensic analysis is prepared aimed at providing the client with a clear understanding of what events occurred leading up to, during, and after a particular case. CryptoForensics will provide an objective point of view of the evidence to help the client determine appropriate legal actions.

Depending on source evidence depth, the types of information reported may include:

  • Files of interest
  • Email communications
  • Indicator of compromise
  • File access times
  • Internet history
  • Timelines of incident
  • Auxiliary devices (USB)
  • .LNK files

CRYPTOFORENSICS CAPABILITIIES

Our Comprehensive Suite of Solutions and Services . ..

WHAT'S NEW?
CYBER DEFENSE DIVERSIFICATION

Today, most enterprises try to deal with cybersecurity threats by focusing inwardly through conducting vulnerability assessments, making detailed network maps, and in some cases, deploying robust patch management processes to continuously monitor their networks and systems. While this approach provides some benefits, against many cyber threats it's ineffective. Most corporate networks are so large and complex that it's simply too difficult to identify all of their assets, or all of their vulnerabilities, and patch them fast enough. Today's cyber wrongdoers are sophisticated, well-funded, and patient—they use a wide range of techniques to penetrate even well-protected enterprises...