FB Twitter

Cyber Forensics

Cyber Forensics

InfoSecure's Cyber Forensic team, along with the Incident Response Team, is on call 24/7 to respond to client emergencies.

Licensed Private Investigators

InfoSecure's team is unique in that we are insured, bonded, and licensed private investigators.  What does this mean for you? Simple: Our investigation techniques and chain of custody are accepted by most law enforcement agencies.  This distinction has helped InfoSecure become an approved Criminal Investigative Agency for the Bexar County (Texas) Criminal District Court.

What We Offer

Perform incident response and forensics

Perform electronic evidence collections

Perform digital forensic acquisitions

Examine and analyze text, graphics, multimedia, and digital images

Conduct thorough examinations of computer hard disk drives, and other electronic data storage media

Recover information and electronic data from computer hard drives and other data storage devices
Follow strict data and evidence handling procedures

Maintain audit trail (i.e., chain of custody) and evidence integrity

Work on technical examination, analysis, and reporting of computer-based evidence

Utilize forensic tools and investigative methods to find electronic data, including

Internet use history, word processing documents, images and other files

Gather volatile and non-volatile information from Windows, Mac, and Linux

Recover deleted files and partitions in Windows, Mac OS X, and Linux

Perform keyword searches including using target words or phrases

Investigate events for evidence of insider threats or attacks

Support the generation of incident reports and other collateral

Investigate and analyze all response activities related to cyber incidents

Plan, coordinate and direct recovery activities and incident analysis tasks

Examine all available information and supporting evidence or artifacts related to an incident or event

Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

Conduct reverse engineering for known and suspected malware files
Perform detailed evaluation of the data and any evidence of activity in order to analyze the full circumstances and implications of the event

Identify data, images and/or activity which may be the target of an internal investigation

Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling

Search file slack space where PC type technologies are employed

Examine file type and file header information

Review e-mail communications including webmail and Internet Instant Messaging programs

Examine the Internet browsing history

Generate reports which detail the approach, and an audit trail which documents actions taken to support the integrity of the internal investigation process

Recover active, system and hidden files with date/time stamp information

Crack (or attempt to crack) password protected files

Perform anti-forensics detection

Maintain awareness and follow laboratory evidence handling, evidence examination, laboratory safety, and laboratory security policy and procedures

Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred

Apply advanced forensic tools and techniques for attack reconstruction

Perform fundamental forensic activities and form a base for advanced forensics

Identify and check the possible source/incident origin

Perform event co-relation

Extract and analyze logs from various devices such as proxies, firewalls, IPSes, IDSes, Desktops, laptops, servers, SIM tools, routers, switches, AD servers, DHCP servers, Access Control Systems, etc.

Ensure that reported incident or suspected weaknesses, malfunctions and deviations are handled with confidentiality

Assist in the preparation of search and seizure warrants, court orders, and subpoenas

Provide expert witness testimony in support of forensic examinations conducted by the examiner

Need Help? Call 877-674-6965 ext 2 or Complete this Form

All it takes is your name and phone number or email address to learn more about our services and expertise. If you'd like, you'll also be able to send additional details after you submit your information here.

  • This field is for validation purposes and should be left unchanged.