SourcetekIT is one of the very few organizations with cybersecurity professionals with top-level security clearances (US Fed security clearance). This enables us to provide our clients with the highest level of confidence in performing security incident analysis and forensics.
Our Forensics and Investigation solutions give organizations everything they need to rapidly detect, triage, investigate, and minimize the impact of attacks. This includes providing attack context, infrastructure-wide visibility, codified expertise, rich intelligence, and insights gained from front-line experience responding to the world’s most impactful threats.
establish strict procedures and guidelines that are to be followed when conducting the forensics investigation.
gaining a better understanding of the details; defining the types of evidence that is to be obtained, how it will be preserved, and the source.
A detailed document of the specific details about the hardware, software and systems being investigated along with all the resources utilized in the process etc..
Investigators use a variety of methods to perform an analysis. Some of which include; analyzing file names, determining when and where data was created, and connecting files on storage devices to online transfers.
Document summary on the process in which this investigation was conducted, highlighting the crucial points of interest. It will also provide how the policies and procedures were followed throughout, how the evidence was protected, the methods used and most importantly the outcome of the analysis.