Digital Forensics

Digital Forensics

.

Digital Forensics encompasses the identification and investigation of material found in digital devices, often in relation to a number of computer crimes.

PRS provides a full-range of litigation support services, including:

Forensic Consulting: Perform digital evidence assessments, advise on case strategy, communicate results and findings in a non-technical manner and recommend next steps in the forensic investigation.

Technical Consulting: Process encrypted data, perform file conversions, produce emails and other forensic materials and support additional search or special case-related requests.

Deposition Consulting: Preparation and review of deposition Q & A and respond to deposition appearances.

Affidavit Consulting: Preparation and review of affidavits.

Expert Witness Testimony: Serve as an expert in a case

Computer Forensics Services
Computer Usage Analysis
Enterprise Storage Failure & Data Recovery
Computer Forensic Analysis
Website Security Analysis
Database Forensics
Link File Analysis
Connected Storage Device Analysis
ESI Chain of Custody
Data Removal & Certification
Computer Forensics Expert Witness Testimony

eDiscovery

eDiscovery refers to the discovery of information in electronic format. The data can be subject to local rules and agreed-upon processes, and is often reviewed for privilege and relevance before being turned over to a client.

Our professionals utilize six (6) stages of the eDiscovery process as a guideline:

Identification: The Identification phase is when potentially responsive digital information is identified for further analysis and review. Custodians who are in possession of potentially relevant information are identified. To ensure a complete identification of data sources, data mapping techniques are often employed.

Preservation: Preservation phase is where data is identified as potentially relevant is placed in a legal hold. This ensures that data cannot be destroyed. Special care is taken to ensure this process is defensible with the end-goal of reducing data spoliation or destruction.

Collection: In this phase, digital evidence will be preserved, and the collection process can begin. Collection is the transfer of data from a company to their legal counsel, who will determine relevance and disposition of data.

Processing: During the Processing phase, digital files are prepared to be loaded into a digital review platform. This phase involves the extraction of text and metadata from digital files.

Review: In the Review phase, documents and digital evidence are reviewed for responsiveness to discovery requests and for privilege. PRS uses standard tools to make it easy for large groups of document and digital evidence reviews and assessments.

Production: During this final phase documents and digital evidence are turned over to opposing counsel, based on agreed-upon specifications.

Data Recovery & Data Backup Methodologies

Providing Data Backup & Recovery is one of the services that we offer at PRS. Even though it does not fall into the realm of Defensive Security, recovering your data if you have a hard drive failure can leave you exposed in some cases. Additionally, having a robust backup plan in place can save time and money for your business.

*We provide backup solutions for all operating systems and infrastructures.

Below is a list of Data Recovery services we provide:

• SSD Data recovery

• Hard Drive recovery

• Laptop Data recovery

• Server Data recovery

• RAID Data recovery

• RAID Repair

• Database Data recovery

• File & Email Data recovery

• Tape Data recovery

• Encrypted Data recovery

• USB Flash Data recovery

• Apple Device Data recovery

• iPhone Data recovery

• Smartphone Data recovery

• Emergency Data recovery

.

Network Audits

Our professionals can perform assessments, audits and “Advanced Persistent Threat” (APT) simulations.

Security assessment components include, but are not limited to the following:

Vulnerability Assessments: This assessment will examine and identify network vulnerabilities for internal/external systems to determine their potential of exploitation. From there we formulate reports and plans detailing our findings and remediation’s.

Security Device Assessments: In this assessment we take an exhaustive look at your network’s security devices, including Next-gen Firewalls, Web Application Firewalls (WAF’s), VPN’s, IDS/IPS, amongst many other devices.

Network Architecture Assessments: Our network architecture review is designed to evaluate the functionality, reliability and compatibility of your business and security systems. With this we obtain the data needed to make your network better; then match these results to an agreed upon security model to create a detailed course of action for any changes suggested.

Wireless Infrastructure Assessments: This assessment will evaluate the security of your organizations wireless environment. Once complete, we will provide you with detailed information for improvement and proper implementation of your wireless system.

Mobile & BYOD Assessments: Our Mobile device assessment brings efficient and effective solutions to your organizations mobile and “Bring Your Own Device” (BYOD) infrastructure. With many organizations today using such a policy, it is important to know you are doing it right.

Network Audit/Penetration Test: These are highly customized audits that include many of the above listed services. They aim to provide a realistic and detailed view of an internal and/or external attack on your organization. This type of audit is often required as part of an industry compliance’s, such as HIPPA and PCI.

With our Network Audit and Analysis, you can ensure your network is ready for whatever your business needs. Our professionals help make sure the network is ready to accommodate change, whether from technology adoption, mergers and acquisitions, organizational alignments or new application deployment.

Key benefits include the following:

• Minimize risk relating to the business systems and network infrastructure.

• Improve business knowledge of the programs (systems) in place throughout the network to facilitate more accurate planning.

• Accommodate change for technology adoption, mergers and acquisitions, organizational alignments, or new application deployment to advance network infrastructures.

• Establish a baseline for best practices, design and implementation of new services, and advanced technologies such as IP telephony, wireless, and advanced security devices.

• Establish compliance levels for the core controls section of the ISO standard for best practices in information security.

• Network Audit and Assessment services can assist your company in minimizing its network infrastructure risk. The main goal is to ensure your network’s availability, agility, efficiency, confidentiality, and integrity.

• Network Audit and Assessment services, you can ensure your network is ready for whatever your business needs may be.

Persistent Threat Solutions

For clients who have malware in their networks that are either extremely persistent or they just need a damage assessment/recovery plan, we provide the services to find, analyze and create custom solutions to meet the clients’ anti-malware needs.

Some organizations may be subjected to targeted attacks that are more purposeful, resourceful and sophisticated. Often spawning from nation-state sponsored attackers; these types of attacks are referred to as “Advanced Persistent Threats” or “APT’s.” To effectively deal with these types of problems, we sit down with our clients and create custom and efficient solutions including removal, recovery and protection for safety, years down the road.

We are also able to assess your network security appliance’s effectiveness therefore helping you to keep up-to-date efficiently to identify/detect, resist and respond to any sophisticated attack.

Mobile Forensics

Our professionals forensics and security assessments for many types of mobile devices. We currently support iPhone (all versions), iPad (all versions), and iPods (all versions), Android, Windows Mobile, and Blackberry-based devices.

The following is a partial listing of content that can usually be retrieved from smart phone devices:

• Call logs
• Contact lists
• Locations (Wi-Fi, cell towers and GPS coordinates)
• SMS (Text) and MMS (Video/Audio) Messages
• Images
• Videos
• Email

Please Note: Cell phones and mobile devices can be valuable sources of information in many types of investigations. A PRS representative is often able to copy all of the data off the device for further review or analysis in a few hours’ time.

Web Security

Any website platform or content management system (CMS) can be hacked – especially if you’re not updating it regularly or applying website security best practices. In order to be secure from hackers, you’re web server and CMS needs to “hardened” against virus or malware infections. PRS provides full website security audits and can identify vulnerabilities, correct them, and provide preventative security solutions to protect from future attacks.

.

Connect with a member of the PRS management team today
to learn more about how we may be of assistance to you!