Network Forensics
Most businesses would be lost without computers and other devices to make their work easier and faster. And, subsequently, if they weren’t networked how efficient would a business be? However, this convenience opens a network up to other external vulnerabilities. Attackers are able to get into your systems: often leveraging malware or other security vulnerabilities to do so.
Network data is dynamic and volatile and as such is imperative that evidence is collected and preserved as soon as possible. Therefore, we will work with your IT personnel and/or department to…
- Collect, preserve, and review network logs,
- Collect and review network packet capture data,
- Collect and review email logs, and
- Collection and review web browser history logs (both network and host-based).