Digital Forensic Services
Computer forensics is a scientific process that captures and analyzes information stored in any electronic format for the purposes of investigating allegations and finding the truth.
Computer forensics is a scientific process that captures and analyzes information stored in any electronic format for the purposes of investigating allegations and finding the truth.
Chorus Consulting has been a trusted provider of computer forensic analysis and litigation support for over two decades. We offer a wide range of forensic services covering all digital devices. We have state-of-the-art labs, as well as a global network of responders, allowing us to perform forensic analysis for virtually any matter, in any environment. Chorus Consulting qualified experts have appeared in court or testified via affidavit in support of civil litigation.
[/morello_icon_image_block]
Chorus Consulting computer forensics experts can determine if an employee connected a device such as a removable USB storage device or if a CD was created which contained confidential data. A true expert can even identify the make, model and serial number of the removable storage device, when it was first connected and the last time it was used. They can also identify which data was deleted and often times can even recover the information. Printing a document also leaves a trail which can be uncovered and can provide key information about the theft itself. Frequently, websites visited by an employee will bring context to the theft or even constitute direct evidence.
[/morello_icon_image_block]
Surprisingly, most companies do not address the danger of stealing electronic information through smartphones. These devices often have enormous storage capacity (the most recent iPhone is capable of storing 32GB of data) and are easily connected to the corporate email system. They can also access WiFi wireless networks for high transfer speeds and even have the ability to connect to a company’s private network. The combination of storage, data access and ubiquity make a mobile communication device an ideal method of stealing data.
[/morello_icon_image_block]