UNVEILING THE HIDDEN PIECES
Utilizing advanced, innovative techniques and our in-depth experience, we recover and reconstruct digital Information that someone might be trying to hide. We find out exactly how a computer was used, and we clearly report the facts. All of our materials are presented on a secure online site, allowing you to easily and safely review your data.
We know that litigation is a huge challenge even before you get anywhere near the courtroom. Today, evidence is everywhere—from computers and servers, to cell phones and tablets, the amount of data available is nearly endless. Wading through oceans of data can be overwhelming and time consuming, but this is where Computing Source offers an edge.
Our dedicated specialists are extensively trained and experienced in the art of investigation and computer forensics, ensuring we cut through the clutter and hone in on the most important facts for your case.
Our experienced forensic consultants know how to follow the data and see where it goes. While a bring-your-own-device policy generally represents a security vulnerability, the silver lining is that users will frequently back up their mobile devices to their computer—sometimes unknowingly. As a result, there is often a wealth of information there that can be accessed. Employees will sometimes go to great lengths to try and cover their tracks, and establishing a likely timeline for altering, erasing or removing files is key.
Our forensic professionals dig deep into the digital depths of the machine, going beyond basics like internet history and email records to find hidden traces of suspicious behavior and using advanced techniques to recover deleted files. They can use hash values as a digital fingerprint (a hash value is a unique value for every file or document) to identify your proprietary files. If one of those proprietary files shows up on a former employee’s home computer or a new company’s system, they need to explain why and how it got there. Sometimes the removal of intellectual property genuinely is inadvertent. A former employee may not have realized that their old thumb drive had proprietary data on it, for example. But in other cases, the theft is much more significant—and the intent is clear.
If a theft is confirmed, you need to be prepared to take action. If the user was accessing Dropbox to execute the removal of files, for example, it may be necessary to go after that Dropbox account. If any USB devices were being attached to the computer, they will also need to be accounted for. Once you start going after personal computers or another business’s computers things can get messy. You may need to seek injunctive relief from the courts, and the resolution may include everything from outlining deletion protocols for sensitive data that has been removed, to perhaps even stopping the former employer from working. In contentious cases, a legal settlement is not uncommon. To get to that point, however, you need to be smart in the wake of a termination or high-level departure—and you need to preserve evidence and protect your ability to identify and prove when intellectual property theft has taken place.
Computing Source is equipped to help you with all of this and has a track record of provable results!