Case Study: A Computer Forensics Nightmare for a Family Run Business

Is Your Data at Risk Because of Google Glass?
May 29, 2014
Case Study: Catching Digital Property Thieves Using Forensics
June 9, 2014
Show all

Case Study: A Computer Forensics Nightmare for a Family Run Business

computer forensicsIf you are a business owner or operator of a company that employs others, you may be the type that often trusts your employees with some of your company’s most valuable information. This could include information about clients, business practices, or other materials that offer a glimpse into the ways you do business.

You have probably also had an employee leave your operation, perhaps even to start their own company. They may even become your competition. In that situation, it is vital to know that your proprietary information is secure and your former employee is not able to use your hard work for their gain.

In a recent case, we came across the following situation:

A member of a family-run communications business left the company. While denying it, the individual started a business in direct competition with the family business. The individual’s computer was identified as an asset of the original company. The individual claimed that no company information was on the computer. Though the computer drive had been completely deleted, reformatted, and overwritten with the installation of entirely new operating systems and applications, PRUDENTIAL Associates was able to recover original database entries crucial to proving the clients’ claims and making their litigation successful.

Protecting Your Business

Even small companies and family businesses are susceptible to the theft of company secrets. Cases like this are more common today than ever before. Which is one reason the world of computer forensics has grown tremendously in recent decades, and is a reliable source of evidence for law enforcement. If you are subject to a similar situation, you can protect your business.

As you can see, there are ways to expose wrongdoing even if the files on a computer are seemingly out of sight. Data recovery is very advanced, and documents can be uncovered and the original authors can be determined. In cases that involve proprietary information, and determining who owns it, an expert in computer forensics and data recovery is one of the most important things you can have on your side.

How Do You Know You Need Computer Forensics Assistance?

In short, all business owners and operators would benefit from assistance in computer forensics. It may be as simple as recognizing how employees use computers at work as a matter of productivity. For example, if you have a salesman that should be making 100 calls per day, but is spending too much time on the Internet, it can affect his or her performance and your bottom line.

Furthermore, if an employee is using company time and property to visit websites they shouldn’t be visiting, you should know about it. You should also know if they are accessing any sensitive information or files that could be dangerous in the wrong hands or are compiling your hard work to exploit it as part of their new business ventures.

Succeeding in business is difficult, and some people want to take short cuts. They may think that they can take your ideas and operational strategies and make them work elsewhere. Also, others may hold some sort of grudge against you and aim to use your ideas to take you down. Others simply waste your time and money. With the rise of things like computer fraud and hacking, your personal information could be at risk.

In all cases, it is important to know what is going on in and around your business and it is always a good idea to be prepared for the worst. Therefore, computer forensics and data recovery are important tools for you. PRUDENTIAL Associates utilizes proper legal techniques to collect electronic data and mine forensic evidence. Our processes and diligence assure you the best likelihood of information recovery (even in cases where the user has attempted to delete/destroy evidence), the strongest legal case, and the greatest potential for data preservation.

Sources:

https://forensiccontrol.com/resources/beginners-guide-computer-forensics/
http://www.biztechmagazine.com/article/2011/03/protect-your-business-computer-forensics