Publications

SECURITY ADVISORY : Heightened threat from a very damaging infection

As a specialist in investigating and responding to cybersecurity incidents, Forensik is concerned about a marked increase, over the last 3 months, in a threat that has already affected a number of our clients, seriously impacting the availability of their systems and their ability to conduct their business.

read more

Security bulletin regarding e-mail accounts using cloud computing

Experts with Forensik are concerned about a rise in cybercriminal activities targeting business webmail accounts such as Office 365 and Gmail (but not restricted to these). Our teams have noticed that very well-organized, patient hackers are succeeding in diverting electronic payments, in some cases amounting to hundreds of thousands of dollars or more.

read more

Introducing ReaKtionTM, our cyber-attack response service

Les tendances en Forensics numérique sont en constante évolution. De plus en plus, l’enquête informatique traditionnelle fait place à de nouvelles méthodes de recherche misant sur le Live Forensics. Parmi ces nouvelles méthodes de travail, connaissez-vous le Memory Forensics?

read more

The fundamentals of Memory Forensics

The trends in digital forensics are in constant evolution. More and more, traditional computer investigation has given way to new research methods focussing on Live Forensics. Among these new working methods, have you heard about Memory Forensics?

read more

Our team at the Colloque RSI

On May 12, don’t miss the Colloque RSI information security conference organized by ASIMM. Our computer forensics expert Loïc Bernard will be one of the speakers at this Québec flagship event.

read more

Is your business ready?

As the person responsible for information systems security in your company, you have no doubt put in place information security monitoring tools and processes. For example, you have probably adopted solutions for detecting an abnormal event on your network. If that takes place, your team reacts by setting in motion the planned intervention protocol to resolve the incident.

read more

Go beyond a digital forensics investigation

Whether your business is the victim of fraud, an information leak, online bullying or even time theft by its resources, there are many ways to identify those responsible for these illegal acts. To increase your chances of identifying the perpetrators and putting a stop to their activities, you can combine a physical investigation with a digital one.

read more