Concerned that you may have been “hacked”? We assist with investigations related to intrusion detection and incident response.
Our methodology begins with a comprehensive vulnerability assessment of the systems environment.
Next, we can help your business by:
- Identify system vulnerabilities and weaknesses;
- Determine whether a security breach may have occurred that affected company or customer data; and
- Determine the scope of the potential breach.
We use automated tools and perform manual analysis to determine any evidence of compromise, including what type of data was susceptible to leakage, how much information could have been taken, and if information was modified, copied, or deleted.
Finally, we use this information to determine what steps need to be taken next to address the identified security, reputation, and compliance risks associated with the breach.