Mobile forensics
the scope and the perpetrator of the attack.
Fast and effective reconnaissance with mobile forensics
What is mobile forensics?
Digital forensics experts secure and analyze digital traces.
Why is digital forensics important for your company?
Our approach to digital forensics
Digital forensics - procedure
Preparation, data collection, investigation, data analysis, documentation and optional follow-up.
In addition, our experts can support you in incident response and crisis management to deal with the consequences of a cyber attack.
Digital forensics secures traces of attacks for use in court
The digital forensics process in six phases
We will discuss the initial situation with you and explain our approach. Depending on the incident, the appropriate forensic tools will be selected.
Data collection
We collect important data from potentially affected components during this phase. This includes, for example, system time and system date, active processes (system status), open network connections (sockets) and logged-in users.
Investigation
The collected data is now analyzed and the data relevant to the incident is filtered out. Some data can be excluded from further analysis (e.g. by using unchanged checksums). However, it may also be necessary to extend the analysis to additional parts of the IT system.
Data analysis
The findings from the partial investigations of the various components concerned are integrated into a coherent timeline and logically linked together.
Documentation
Our IT forensic experts summarize the recorded processes of the investigation in reports. These are adapted to the respective target group; the management report contains different technical details than a report for administrators. If it is necessary to inform the authorities, we will support you in drafting the relevant reports.
Follow-up (optional)
Optionally, we identify potential vulnerabilities after incident handling. We provide recommendations for measures to prevent future attacks and support you in improving your company's response strategy (incident response process).
Important security-related topics
Hackers falsify your e-mail address
Hackers often use fake CEO emails to infiltrate corporate networks. If they have access to such emails, they can commit CEO fraud and infiltrate the network more easily. If a hacker tries to infiltrate a company's network...
Anti-phishing email policies in Microsoft Office 365
Admins can use Microsoft 365 Defender for Microsoft 365 to create policies to protect against phishing attacks. Special policies are used for this purpose, which can be created directly in the Microsoft 365 Admin Center. To create email policies in Microsoft 365...
Four times more ransomware cases due to attack on ERP
A new ERP Threat Report from Onapsis and Flashpoint highlights the evolution of the SAP threat landscape over the last four years. It shows the growing maturity of this cybercriminal market and the challenges faced by the defense side. Established,...