by bangmarketing | March 2016 | Uncategorized |
This month, Forensik provides you with a list of essential things to consider before you launch a computer forensics investigation. If you carefully follow this advice, you will avoid making costly mistakes.
by bangmarketing | February 2016 | Uncategorized |
As the person responsible for information systems security in your company, you have no doubt put in place information security monitoring tools and processes. For example, you have probably adopted solutions for detecting an abnormal event on your network. If that takes place, your team reacts by setting in motion the planned intervention protocol to resolve the incident.
by bangmarketing | January 2016 | Uncategorized |
Whether your business is the victim of fraud, an information leak, online bullying or even time theft by its resources, there are many ways to identify those responsible for these illegal acts. To increase your chances of identifying the perpetrators and putting a stop to their activities, you can combine a physical investigation with a digital one.
by bangmarketing | September 2015 | Uncategorized |
Have you noticed an anomaly in the activities of a computer or in a colleague’s behaviour? Have you observed fraudulent activities toward your company online?