Our services cover all the essentials, from recovery of data from crashed hard drives to complex digital forensic investigations involving large networks and cloud data.
These days, most business information is stored digitally. Whether this data is contained on site, in cloud servers or mobile devices, it can be mined and put to use in investigations – by people who know how. ISRA identifies, accesses, recovers and analyses information in digital form.
With our solid experience of digital forensics we provide accurate, effective and cost efficient investigations. In practice, we support our clients with services that are necessary in IT-dependent business. We find and secure digital evidence, we respond to incidents when our clients are under digital attack, and we help our clients implement the necessary digital and organizational security protocols. And don’t worry, we are just as pleased to step in and recover your valuable data in the event of a common and completely accidental hard drive crash!
When do you need digital forensics?
- Internet abuse among employees
- Criminal fraud or deception
- Unauthorized disclosure of corporate information
- Damage assessment, i.e. following accident
- Industrial espionage
Are you under attack ?
The loss of data can be costly, whether it is caused by accident or by malevolent hackers, or fraudsters who aim to get hold or your immaterial assets. Fortunately swift and professional response can help minimize the losses and damages caused by negative publicity, and allow you to continue operations as normal. ISRA’s incident response plans ultimately depend on the needs of our clients, but usually involve the identification of lost data, tracking the attacker and implementation of a strategy for recovery of lost data. We handle all evidence in accordance with professional forensic standards, to allow for their use in legal action.
Secure your IT-environment!
IT-security is a top priority for all information technology executives. But most businesses don’t have the competence to implement this security preparedness in-house. And those that do know the wisdom of bringing in external expertise to run IT-security audits, penetration tests and similar – everything to make sure that crucial data is secured and no access points are left unguarded. And that’s where we come into play!
Our Work Speaks For Itself…
This was a straightforward digital forensics assignment, were suspicions already pointed in the direction of one of the employees. With forensic techniques we captured images of this suspect’s computer, and then executed a manual file recovery. Then followed the work of decrypting files that were heavily encrypted for protection, as well as making a script to facilitate the interpretation of the recovered data. The result of uncovering the data proved economically satisfying to our client. The suspected employee had been involved in a large-scale fraud. The investigation also provided conclusive evidence against this fraudster, locating the account where his private gains were banked.
The digital forensic work on this case primarily involved collection and analysis of logs from firewalls, servers and parts of the network. In addition, it proved valuable to conduct interviews with the client’s IT-staff, to get a clearer understanding of routines etc. We could soon confirm that there had in fact been an intrusion, where the perpetrator had gained full access. But we could also pinpoint the vulnerability in the particular application that the intruder had used, and identify malware that granted remote controlling. The location of the intruder could be identified and our client referred the case to legal authorities.
We helped our client reform existing IT-security and incident response routines to ensure that they corresponded to current industry standard best practices. In addition, we provided practical training for the IT-staff in the fields of data collection and incident response. At the end of this assignment, we performed penetration tests and similar to make sure that the security of our client’s network and the competence of the staff could withstand and deal with potential attacks in the future.
A former employee of the telecommunications company was suspected of having extracted copyright covered Java code and using it to the benefit of his new employer. In this case, the source code was extracted by a process of decompilation, and we could provide a detailed forensic report of the events to support our client’s legal action.
The particular feature of this assignment was the time restraint. Our client had an important meeting with a client of his own – in two hours from the time of contact! Certain files would be demonstrated and discussed at this meeting, and showing up without them was not an option. Fortunately, this case was easily resolved. Though the hard drive proved permanently damaged, we managed to recover the necessary files. In time!