Information & Data Security

Information and Data Security

Digital Forensics focuses on support to Corporate Clients in the following areas:

  • Incident Response – Quickly investigate and positively determine if any compromises have been made to your systems as the result of an incident – without taking your system out of service. Special attention should be paid to Windows Rootkits and the threat they pose.
  • System Audits– Effectively audit systems throughout the network to insure that they have not been compromised.
  • Internal Investigations– Investigate and monitor internal computer systems to insure compliance with the law or corporate policies.
  • Computer Forensics– Thoroughly examine all data on a computer system, locate any evidence that is stored on that system and safely preserve that evidence for use in a court of law.

Supported Departments:

  • Information Technology
  • Human Resources
  • Legal Department

Training:

  • Incident Response Formulation, Planning & Evaluation.
  • First Responders Guide To Digital Crime Scenes.
  • Search and Seizing Computers in Criminal Justice Investigations.

As Admiral Plehal indicates, the threats to our information comes from many sources, via a variety of methods and for many different reasons. Whether state sponsored high level industrial espionage; “Annual Report to Congress on Foreign Economic Collection and Industrial Espionage” to the lone disgruntled employee who installs data collection Spyware on your network – each entity is determined to obtain your, or your customers information for their purpose.

Digital Forensics believes soundly that information security is about more than just technology. Accordingly, we focus on the “human factor” and employ technology as a tool to minimize the threat posed by the improper and/or illegal use of technology in the corporate environment.

A recent article by Mr. Heath, Titled; “Beware Of The Inside Job – Is Your Trusted Network Truly Trustworthy?” Discusses at length the issue of INTRANET security vis-à-vis trusted individuals within an organization. In this article, Mr. Heath discusses in depth the information system architecture of many organizations and offers thoughtful insight on potential ways to mitigate exposure to an internal threat.

In keeping with this theme, Sharon Gaudin recently published an article “Nothing is Secret with Spyware Lurking in PCs” in this article she discusses the threat posed by Spyware applications which may be actively working on your system today. In an additional article, Sharon Guiden wrote of the threat posed to corporation by employee use of Peer-to-Peer Networks “Despite IT Efforts, Corporate P2P Use Rampant.”

We assist our clientele in meeting state and federal regulatory requirements by helping them develop and implement programs which safeguard personal, medical, and intellectual-property information.

The following linked article “National Strategy To Security Cyber Space” provides detailed provides a framework for protecting this infrastructure that is essential to our economy, security, and way of life.

Additionally, “Annual Report to Congress on Foreign Economic Collection and Industrial Espionage” that the United States continues to be threatened by the theft of proprietary economic information and critical technologies.

The 2005 Computer Security Institute (CSI)/Federal Bureau of Investigation (FBI) Eighth Annual Computer Crime and Security Survey paint a compelling portrait of just how often crime occurs on computer networks and just how expensive such crime can be.

How Safe Is Your System? provides an excellent topical overview of the elementary how and whys of computer intrusion.

Digital Forensics possess extensive capabilities to assist corporate client’s in identifying and reducing the threats to their product, information and/or reputation.

“We increasingly rely on new information technologies and the Internet to conduct business, manage industrial activities, engage in personal communications, and perform scientific research. While these technologies allow for enormous gains in efficiency, productivity, and communications, they also create vulnerabilities to those who would do us harm. The same interconnectivity that allows us to transmit information around the globe at the click of a mouse or push of a button also creates unprecedented opportunities for criminals, terrorists, and hostile foreign nation-states who might seek to steal money or proprietary data, invade private records, conduct industrial espionage, cause a vital infrastructure to cease operations, or engage in Information Warfare. (Rear Admiral Jim Plehal, Director, Infrastructure or the AIA and Department of Homeland Security “.

Digital Forensics
964 Fifth Avenue
Suite 235
San Diego, CA 92101

Phone: 619.446.6344
Email: director@hightechnologyforensics.com

Contact Digital Forensics

 

Verify that your are human

 
Information and Data Security

Digital Forensics focuses on support to Corporate Clients in the following areas:

  • Incident Response – Quickly investigate and positively determine if any compromises have been made to your systems as the result of an incident – without taking your system out of service. Special attention should be paid to Windows Rootkits and the threat they pose.
  • System Audits– Effectively audit systems throughout the network to insure that they have not been compromised.
  • Internal Investigations– Investigate and monitor internal computer systems to insure compliance with the law or corporate policies.
  • Computer Forensics– Thoroughly examine all data on a computer system, locate any evidence that is stored on that system and safely preserve that evidence for use in a court of law.

Supported Departments:

  • Information Technology
  • Human Resources
  • Legal Department

Training:

  • Incident Response Formulation, Planning & Evaluation.
  • First Responders Guide To Digital Crime Scenes.
  • Search and Seizing Computers in Criminal Justice Investigations.

As Admiral Plehal indicates, the threats to our information comes from many sources, via a variety of methods and for many different reasons. Whether state sponsored high level industrial espionage; “Annual Report to Congress on Foreign Economic Collection and Industrial Espionage” to the lone disgruntled employee who installs data collection Spyware on your network – each entity is determined to obtain your, or your customers information for their purpose.

Digital Forensics believes soundly that information security is about more than just technology. Accordingly, we focus on the “human factor” and employ technology as a tool to minimize the threat posed by the improper and/or illegal use of technology in the corporate environment.

A recent article by Mr. Heath, Titled; “Beware Of The Inside Job – Is Your Trusted Network Truly Trustworthy?” Discusses at length the issue of INTRANET security vis-à-vis trusted individuals within an organization. In this article, Mr. Heath discusses in depth the information system architecture of many organizations and offers thoughtful insight on potential ways to mitigate exposure to an internal threat.

In keeping with this theme, Sharon Gaudin recently published an article “Nothing is Secret with Spyware Lurking in PCs” in this article she discusses the threat posed by Spyware applications which may be actively working on your system today. In an additional article, Sharon Guiden wrote of the threat posed to corporation by employee use of Peer-to-Peer Networks “Despite IT Efforts, Corporate P2P Use Rampant.”

We assist our clientele in meeting state and federal regulatory requirements by helping them develop and implement programs which safeguard personal, medical, and intellectual-property information.

The following linked article “National Strategy To Security Cyber Space” provides detailed provides a framework for protecting this infrastructure that is essential to our economy, security, and way of life.

Additionally, “Annual Report to Congress on Foreign Economic Collection and Industrial Espionage” that the United States continues to be threatened by the theft of proprietary economic information and critical technologies.

The 2005 Computer Security Institute (CSI)/Federal Bureau of Investigation (FBI) Eighth Annual Computer Crime and Security Survey paint a compelling portrait of just how often crime occurs on computer networks and just how expensive such crime can be.

How Safe Is Your System? provides an excellent topical overview of the elementary how and whys of computer intrusion.

Digital Forensics possess extensive capabilities to assist corporate client’s in identifying and reducing the threats to their product, information and/or reputation.

“We increasingly rely on new information technologies and the Internet to conduct business, manage industrial activities, engage in personal communications, and perform scientific research. While these technologies allow for enormous gains in efficiency, productivity, and communications, they also create vulnerabilities to those who would do us harm. The same interconnectivity that allows us to transmit information around the globe at the click of a mouse or push of a button also creates unprecedented opportunities for criminals, terrorists, and hostile foreign nation-states who might seek to steal money or proprietary data, invade private records, conduct industrial espionage, cause a vital infrastructure to cease operations, or engage in Information Warfare. (Rear Admiral Jim Plehal, Director, Infrastructure or the AIA and Department of Homeland Security “.