Computer Security Services, LLC
Computer Forensic Examinations
Acquisition, Analysis and Reporting
Are you concerned about intellectual property loss, misuse of company resources, or activities that may reflect negatively upon your brand? We can help you identify what activities may have taken place. We can review data of all types, including Email, text, images, calendar files, databases, spreadsheets, audio files, animation, Web sites and computer programs. Even malware such as viruses, Trojans and spyware can be secured and investigated.
Identify Unauthorized Activities
Electronic Discovery (eDiscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case. Our experts can assist you in preparing your eDiscovery policies, education, and preparation in advance of any eDiscovery event. We are also prepared and equipped to assist you if the unthinkable has happened, and you must respond to an eDiscovery query.
Due to the nature of the ways computers process and store data, the information can be written in a number of places on a hard drive. This information can be recovered, even if the original file is lost or corrupted. Data may be written in memory, on the hard drive in cache, in temporary files, or in multiple places and versions. There are often "tracks" left when a computer user copies or deletes information that can leave traces of lost or hidden information. We can help you recover lost or hidden data, or demonstrate it was moved, deleted, or copied.
Recover Lost or Hidden Information
Whether you have a network system such as routers, switches, or firewalls, computing systems of Windows or Unix variants, any other computing appliance, or computing application, there are likely logs of activities that have taken place. We can review these logs to determine if authorized or unauthorized activities have taken place.
Log Review