Solutions

Information Technology

How well prepared are you in facing IT/Fraud Risk Does your organization face any of the following situation OR incidents? Theft of IP Misappropriation of funds Frauds in procurement process Your employees having alleged illegal links with competitors Periodic fraud risk assessment Non compliance of your IT security policy by your executives Do you have an Incident response programme in place?

Read More

Cloud Forensics

An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple types of audits, multiple objectives for different audits, etc

Read More

Mobile Forensics

Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. The phrase mobile device usually refers to mobile phones; however, it can also relate to any digital device that has both internal memory and communication ability, including PDA devices, GPS devices and tablet computers.

Read More

Mac Forensics

Forensic analysis of a Macintosh (OSX operating system) has several very distinct differences. For the technically inclined, following is a partial list of the differences

Read More