Our company utilizes tools and techniques to examine devices and hardware for signs of both digital and physical manipulation. Using both traditional and non-traditional skill-sets, we are able to gather evidence of many types of manipulation and security breaches. Such evidence includes:
- Whether a locking device has been picked, manipulated or otherwise bypassed.
- Use of cloned proximity cards.
- Digital inventories of hard drives, thumb drives and company issued cellular phones for evidence of data theft or employee sabotage.
- Log file reconciliation for indicators of suspicious activity.
The above list is not inclusive and is not indicative of our complete abilities, as we are bound by non-disclosure agreements and the use of trade-secrets. Should you have any further questions, please do not hesitate to contact us.