Publications
Making the most of your tools to manage vulnerabilities
Publications As you know, vulnerability management is an essential part of an organization’s cybersecurity plan. Although companies recognize the importance of this step, many face a major obstacle: The tools they use to scan their millions of assets have...
Sharing sensitive data securely
Do you ever stop and think about the amount of data circulating around your office? How can you protect your company and manage the vulnerabilities related to this information? Even if you’ve detected the gaps in your own cybersecurity, what about your business partners?
A look at the world of computer forensics
When a client’s IT systems are impacted by a security incident, cyber investigators (or digital forensics investigators) track down the hackers responsible. This profession is still fairly new, but sure to grow as more and more of our day-to-day activities take place in cyberspace.
Building a cybersecurity plan for your company
Today’s pirates have traded gold for data, and rather than sailing the seven seas, they surf the web looking for vulnerabilities. Companies are exposed on several fronts, with no choice but to invest in protection against insidious attacks by cybercriminals. In order to invest wisely, the first step is to detect gaps and assess the cybersecurity risks that threaten your network.
ReaKtionTM now equipped with a mobile app for incident management
Forensik is pleased to announce an important addition to its cyber-attack response service: access to a mobile application dedicated to incident management. This new development was made possible thanks to Forensik’s partnership with technology firm.
SECURITY ADVISORY : Heightened threat from a very damaging infection
As a specialist in investigating and responding to cybersecurity incidents, Forensik is concerned about a marked increase, over the last 3 months, in a threat that has already affected a number of our clients, seriously impacting the availability of their systems and their ability to conduct their business.
Security bulletin regarding e-mail accounts using cloud computing
Experts with Forensik are concerned about a rise in cybercriminal activities targeting business webmail accounts such as Office 365 and Gmail (but not restricted to these). Our teams have noticed that very well-organized, patient hackers are succeeding in diverting electronic payments, in some cases amounting to hundreds of thousands of dollars or more.
Introducing ReaKtionTM, our cyber-attack response service
Les tendances en Forensics numérique sont en constante évolution. De plus en plus, l’enquête informatique traditionnelle fait place à de nouvelles méthodes de recherche misant sur le Live Forensics. Parmi ces nouvelles méthodes de travail, connaissez-vous le Memory Forensics?
The fundamentals of Memory Forensics
The trends in digital forensics are in constant evolution. More and more, traditional computer investigation has given way to new research methods focussing on Live Forensics. Among these new working methods, have you heard about Memory Forensics?
Our team at the Colloque RSI
On May 12, don’t miss the Colloque RSI information security conference organized by ASIMM. Our computer forensics expert Loïc Bernard will be one of the speakers at this Québec flagship event.