Publications

Making the most of your tools to manage vulnerabilities

Publications   As you know, vulnerability management is an essential part of an organization’s cybersecurity plan. Although companies recognize the importance of this step, many face a major obstacle: The tools they use to scan their millions of assets have...

read more

Sharing sensitive data securely

Do you ever stop and think about the amount of data circulating around your office? How can you protect your company and manage the vulnerabilities related to this information? Even if you’ve detected the gaps in your own cybersecurity, what about your business partners?

read more

A look at the world of computer forensics

When a client’s IT systems are impacted by a security incident, cyber investigators (or digital forensics investigators) track down the hackers responsible. This profession is still fairly new, but sure to grow as more and more of our day-to-day activities take place in cyberspace.

read more

Building a cybersecurity plan for your company

Today’s pirates have traded gold for data, and rather than sailing the seven seas, they surf the web looking for vulnerabilities. Companies are exposed on several fronts, with no choice but to invest in protection against insidious attacks by cybercriminals. In order to invest wisely, the first step is to detect gaps and assess the cybersecurity risks that threaten your network.

read more

SECURITY ADVISORY : Heightened threat from a very damaging infection

As a specialist in investigating and responding to cybersecurity incidents, Forensik is concerned about a marked increase, over the last 3 months, in a threat that has already affected a number of our clients, seriously impacting the availability of their systems and their ability to conduct their business.

read more

Security bulletin regarding e-mail accounts using cloud computing

Experts with Forensik are concerned about a rise in cybercriminal activities targeting business webmail accounts such as Office 365 and Gmail (but not restricted to these). Our teams have noticed that very well-organized, patient hackers are succeeding in diverting electronic payments, in some cases amounting to hundreds of thousands of dollars or more.

read more

Introducing ReaKtionTM, our cyber-attack response service

Les tendances en Forensics numérique sont en constante évolution. De plus en plus, l’enquête informatique traditionnelle fait place à de nouvelles méthodes de recherche misant sur le Live Forensics. Parmi ces nouvelles méthodes de travail, connaissez-vous le Memory Forensics?

read more

The fundamentals of Memory Forensics

The trends in digital forensics are in constant evolution. More and more, traditional computer investigation has given way to new research methods focussing on Live Forensics. Among these new working methods, have you heard about Memory Forensics?

read more

Our team at the Colloque RSI

On May 12, don’t miss the Colloque RSI information security conference organized by ASIMM. Our computer forensics expert Loïc Bernard will be one of the speakers at this Québec flagship event.

read more