866-629-3757

Free Consulation

Call 866-629-3757

Cyber Forensic Investigations, Evidence Collection, and Data Recovery

Cybercrime investigations photo.

JSA’s cybersecurity experts are ready to assist you with a complete array of cybercrime protection, data recovery, and evidence collection services. Cyber forensic Investigations include: unauthorized data access; PII (personal identifiable information) exposure; IP (intellectual property/proprietary information) theft; employee social media/email/messaging abuse; ransomware data corruption; and more.

You've got questions. We've got answers. Call 1-866-629-3757 to speak to a private investigator or security consultant.

Computer Forensics allows digital data be collected, examined and preserved so that it can be used in any legal situation. Using today’s current technology; we can find and prepare that evidence for you. It may be the smoking gun that wins your case, or the critical evidence that protects you from an unnecessary lawsuit.

We use state-of-the-art forensic tools and software, such as Guidance EnCase, FTK Imager, Magnet IEF and Axiom. The evidence is collected and documented using court tested techniques to preserve all findings. Depending on the case, evidence can be recovered from multiple sources. Individual computers, tablets, smart phones, networked servers and network device logs are all sources of data that can be collected and preserved to document your case. Our experienced analysis can recover deleted data, document Internet browsing, retrieve social media activity, determine file and network access and reproduce other user activity. Some of the typical cases we deal with are:

  • Improper Employee Activity: Is an employee accessing data or servers they should not be using? Have they copied proprietary data to a USB device or a cloud storage site? Are there allegations of harassment, workplace theft, accounting fraud or inappropriate computer usage? These are all areas where computer forensics can recover the critical evidence.
  • Ransomware: A surge in ransomware attacks are encrypting companies’ data and demanding bitcoin payments to recover the data. We can assist in determining the best strategy to respond to the attack and assist in the ransom payment and data decryption.
  • IP Data Theft: The loss of proprietary information and intellectual property can come from an internal breach by a current or departing employee or from an external network attack. Computer forensics can recover the deleted emails and webmail fragments, and trace the data downloaded to a USB device or cloud storage that details the theft.
  • PII Exposure: Has a data breach exposed Personal Identifiable Information that is on your computers? Our investigation can document the extent of your data breach and potentially limit the size of your reporting requirements.
  • Social Media Usage: Track and discover a computer user’s Internet usage, including sites visited, files viewed, information downloaded, and communications with others through email, instant messaging or other social media products.
  • Cyber Security Audits and Assessments: We conduct data center security audits to determine if your current security products and services (surveillance cameras, access control, DVR, etc.) are consistent with regulatory standards and current best practices.

If your firm has been victimized by cybercrime, call us at 866-629-3757 or click here for immediate, expert assistance.

Save

Save

Call 1-866-629-3757 for expert, discreet private investigation and security consulting services.

  • Jennings Smith Associates Professional Certifications

    • Professional Certified Investigator (PCI), ASIS International
    • Certified Protection Professional (CPP), ASIS International
    • Physical Security Professional (PSP), ASIS International
    • Certified Homeland Security Level 5 (CHS-V), American Board for Certification in Homeland Security
    • Certified Business Continuity Professional (CBCP), Disaster Recovery Institute International
    • Certified Healthcare Safety Professional (CHSP), Board of Certified Hazard Control Management
    • Certified Healthcare Emergency Professional (CHEP), Board of Certified Hazard Control Management
    • Certified Safety & Health Manager (CSHM), Institute for Safety and Health Management
    • Certified Hazard Control Manager (CHCM), Board of Certified Hazard Control Management
    • Certified Forensic Consultant (CFC), American College of Forensic Examiners International

    Certifications Continued

  • NEW SERVICE OFFERING

    Cyber Forensic Investigations

    JSA's cybersecurity experts are ready to assist you with a complete array of cybercrime protection, data recovery, and evidence collection services. Cyber forensic Investigations include: unauthorized data access; PII (personal identifiable information) exposure; IP (intellectual property/proprietary information) theft; employee social media/email/messaging abuse; ransomware data corruption; and more.

    Cyber Forensics Continued

  • Share

  • Major Credit Cards Accepted