Our company utilizes tools and techniques to examine devices and hardware for signs of both digital and physical manipulation. Using both traditional and non-traditional skill-sets, we are able to gather evidence of many types of manipulation and security breaches. Such evidence includes:

  • Whether a locking device has been picked, manipulated or otherwise bypassed.
  • Use of cloned proximity cards.
  • Digital inventories of hard drives, thumb drives and company issued cellular phones for evidence of data theft or employee sabotage.
  • Log file reconciliation for indicators of suspicious activity.

The above list is not inclusive and is not indicative of our complete abilities, as we are bound by non-disclosure agreements and the use of trade-secrets. Should you have any further questions, please do not hesitate to contact us.

Comments are closed.