So You Think
If you think any of your personal devices, company devices, or networks have been compromised, then time is of the essence. Whether you have been the victim of data theft (including the theft of personal/confidential information), communications monitoring, keylogging, or ransomware, what’s important is going on the offensive.
What To Do Next
We have exams for both compromised cell phones and computers. Our basic analysis involves obtaining a forensic image/extraction from your device, using software to index, access, and search the data, analyzing any indicators of compromise, assessing the damage done, and where possible, identifying the attack source.
If you decide to proceed with one of our exams, we provide three tiers of service corresponding to three levels of thoroughness to take your needs and budget into consideration. For both cell phone and computer exams, you’ll receive a detailed forensic report along with our authenticating testimony, that can be used in as evidence to press charges in a court of law in those cases warranting this action.
Request a Consultation
Our digital forensics incident, response, and compromise detection tiers:
Basic Level
Results in 14 - 30 days
For the most basic, least sophisticated attack methods and where court action is not needed.
Standard Level
Results in 14 - 30 days
For more sophisticated attack methods leading to greater compromise and the likely need for legal or court action.
Advanced
Results in 14 - 30 days
For the worst case scenario attack methods, significant compromise and losses requiring extensive post service remediation and legal action.