• NO Processing Fee, No Diagnosis Fee, NO Data No Charge
09 Nov

Cyber Security Services

Cyber Security Services or Services for Digital Forensics

The Forensic Technology Solutions team of East African Data Handlers offers a wide range of services, including Cyber Security Services, Data Analytics, Information Governance, and Digital Forensics.
To effectively meet the objectives of our customers, we offer a distinctive approach to complex commercial dispute and investigation situations.

More than 350 committed forensic technology professionals work for our international practice across African nations. We assist clients in managing enormous amounts of electronic data, navigating legal and administrative processes, and maximizing the value of information assets thanks to our experience in international markets and our dedication to industry-specific support.

Our forensic technology specialists can provide the following services thanks to high-tech  facilities and a main laboratory and data center in Nairobi Kenya:

Forensic Services

Computer forensics or Digital Forensics

  • Criminal investigation (imaging of electronic devices, mobile devices, computers, laptops and servers)
  • Getting emails or folders off of servers
  • Recovery and reconstruction of data (Deleted file analysis)
  • Creating Investigative Support Systems
  • Investigating Phishing
  • Forensics of mobile devices
  • E-discovery management, litigation support, and solutions
  • Planning for Cyber Forensic Readiness Analysis of Malware and Key loggers

Electronic Research or Electronic Discovery

  • Electronic consultation with evidence
  • Collection, preservation, and identification
  • Processing, looking for, and analyzing
  • Technology-aided evaluation
  • Revelation and creation

Analytics of Data

  • Data Mining for Research Objectives
  • Analytics for fraud to spot trends, patterns, and possible fraud
  • Analytics of user access to private databases
  • Purchasing analysis, the two types of transactions are Continuous Transaction Monitoring, Database Forensics, and Data Analytics
  • Interactive dashboards and visual data analytics that clearly convey the data
  • Analyzing company data to better characterize, forecast, and enhance performance

Our Strategy for eDiscovery

Identify

You will receive help from our team of specialists in locating and gathering information and documents to satisfy discovery requirements. This comprises:

  • Identifying your company’s data sources. Recognize the company’s data sources and IT environment.
  • Detailed data tracking for each of the selected data sources

Production

Production of data in multiple formats accurately and on time:

  • Productions in native, TIFF, or hybrid modes
  • Numbering and endorsements for Bates
  • Highlights and redactions are fully supported.
  • Support for a variety of court proceedings
  • Complete EDRM XML compliance

Collection

The discovery team for East African Data Handlers will establish a procedure that will enable the traceability of the data gathered from the company’s systems.

  • For the purpose of ensuring that no data was lost during extraction, all data will be extracted using tools with logging capabilities. To facilitate data validation and ensure that data was not changed after extraction, files will be signed using the MD5 hash.

Processing

Securely and effectively condensing gathered data to a reviewable set.

East African Data Handlers is able to scale and adapt each project to the specific requirements that the case necessitates using a multi-platform approach. The project is managed in close cooperation with an outside counsel. All data-related actions are completely documented so that any queries from the opposition’s legal team, the regulator, or the courts may be addressed.

For every data, we uphold a rigid chain of custody. The procedures we use are intended to increase the effectiveness of outside counsel’s evaluation. Key applications include:

  • With concept-based clustering, data visualization, and filtering technologies, advanced search is possible.
  • Based on statistical similarities across documents, close to de-duplication
  • Sophisticated graphic tools with a concept-based approach
  • Superior email analytics
  • Advanced language proficiency

Lookup & Review

Creating a safe space for collaboration between clients’ legal teams and themselves during a legal review

  • Clustering and search based on concepts
  • Multiple party assessments at various access levels are part of sophisticated encryption and security systems that contain tow function identification and limited access.
  • Support for native, mixed-mode, and tiff file formats in local and batch production
  • Complete set of project management reports, including statistics for reviews
  • Complete highlighting, redaction, and annotation
  • Issue tagging and bulk smart issue coding the whole audit trail
  • Adaptable reports
Cyber Security Services

Cyber Security Services

Our digital forensic investigation services will be useful to the following people:

Basically, any business has a reasonably complicated IT and computer architecture. Numerous organizations have made headlines after being subjected to harmful attacks. However, sometimes problems can go unreported since some businesses would rather keep the issue quiet.

The following organizations and roles are typical candidates for our digital forensic investigations services:

  • Enterprises engaged in manufacturing and industrial processing, public authorities
  • Medical practices and health organizations
  • Companies that produce technology and have IP to protect
  • Power supply and distribution companies
  • Operations in supply chain management
  • Ecommerce businesses
Share this
18 Oct

How to Investigate a Digital Forensics Crime Scene in 3 Steps

How to Investigate a Digital Forensics Crime Scene in 3 Steps

Introduction: What is Digital Forensics?

Digital forensics is the process of investigating digital media for evidence. It can be used to investigate a wide range of crimes, such as theft, fraud, identity theft and embezzlement.

Digital forensics can be used to find out who did what on a computer and when they did it. It can also tell us what was done on the computer and how it was done.

The digital forensics investigation process has four steps:

1) Preservation: This step is all about making copies of the data on the hard drive or other digital storage medium before any changes are made to it.

2) Collection: This step is all about collecting data from devices such as computers and cell phones that could have evidence stored on them.

3) Examination: In this step, investigators will analyze the collected data for clues or evidence that could help with their case.

4) Reporting: In this final step, investigators will summarize their findings in a report for law

Digital Crime Scene Investigation in 3 Steps

Step One: Find the Data

Data is the most important asset of any company. This is why it’s crucial for companies to have a clear data strategy. In order to find the data, you need to know what data you are looking for, where it’s coming from and how much of it needs to be collected.

Step Two: Collect Exhibits and Evidence

Police officers use different methods to collect evidence, but the most common one is to request a search warrant. This means that they need to provide a judge with enough information for him or her to issue a warrant.

The judge will want to know about the alleged crime and why the police officer needs access to specific information. The officer will then have to provide the judge with all of the exhibits and evidence collected so far.

Step Three (and Most Important): Analyze Evidence and Conclusions

Forensic analysis is a method of analyzing digital evidence to identify any patterns or anomalies that may be relevant to the case.

The first step in forensic analysis is to identify the type of data that needs to be analyzed. The second step is to determine what type of forensic analysis technique needs to be used in order for the analyst to get the best results.

The third and most important step in forensic analysis is analyzing evidence and conclusions. One must analyze all of the evidence and come up with a conclusion based on all of this information.

Conclusion and Takeaways from this Case Study – How to Investigate a Digital Crime Scene in Steps

Investigating a digital crime scene is not an easy task. It takes a lot of skills and knowledge to perform such an investigation. However, there are 4 steps that can be followed in order to investigate the crime scene.

The first step is to gather all the necessary information about the incident and the victim. This includes personal details, social media accounts, email accounts, text messages and mobile phone records. The second step is to identify any suspects who might have committed the crime and their digital footprint. Next, you should try to recover deleted data from any devices or computers that were used during the incident or in relation to it. The fourth step is to investigate any links between the suspect and victim on social media sites like Facebook or Instagram. After this you should find out if there are any other suspects in connection with this case by identifying their digital footprints as well as investigating their online activity on social media sites like Facebook or Instagram etcetera.

How do you become a Digital Forensics Expert?

Digital forensics is the process of examining digital information for legal or law enforcement purposes. The field has been around for a long time, but it is still evolving.

There are several ways to become a digital forensics expert. You can take formal courses and earn an undergraduate or graduate degree in the field. You can also learn on the job by working as an intern in a digital forensics lab and gaining experience that way.

You have got to have the hunger. Digital forensics is not just what I do, it’s who I am’

This section is about how digital forensics has become a part of one’s identity. Digital forensics is not just what they do, it’s who they are.

The world has changed and so has the way people live in it. There are many things that we can’t do without the internet, and that includes our daily lives.

1. Firstly, it would be good to get a little bit of background on yourself, as a person, and how you got into working in digital forensics?

I became interested in digital forensics when I started taking courses in programming. I felt it was a natural progression to take classes in computer forensics and digital evidence investigations.

2. Did you do any studying alongside working?

I studied alongside working for the first few years of my career. This allowed me to gain valuable experience in a different setting which I would not have gotten otherwise.

4. How do you manage learning alongside your job?

Balancing work and education can be difficult. It’s important to plan your schedule accordingly and set goals so you’re not overwhelmed by the number of tasks you need to complete.

5. Do you think that this passion and hunger is a necessary characteristic that digital forensicators should possess?

Digital forensicators are responsible for the preservation, identification, extraction, analysis, and reporting of digital media found in criminal investigations. Digital evidence can be found on a variety of devices such as computers and cell phones to name a few. It is important that these professionals possess the aforementioned passion and hunger so that they can achieve success in this field.

6. Do you think there is a current skills gap in DFIR? If so, can you talk to us a little bit about why?

There is currently a skills gap in DFIR, but I believe that there’s also a need for more people to be interested in the field. Most of the people who are in the tech industry are more interested in developing apps and games than they are with solving crimes. This is because DFIR is seen as a less-glamorous job. One way to combat this lack of interest is by giving

7. Do you see a rising need in digital forensics and incident responder experts?

With the increase in cyber attacks and data breaches, the need for digital forensics and incident responders has risen. With recent breaches at companies like Uber & Equifax, it is becoming clear there is a need for qualified individuals to investigate these types of incidents.

8. Is there any particular trends you see around the world with cyber security experts moving into digital forensics?

Cyber security experts are becoming more and more in demand. The increased cyber-attacks and data breaches have led to a significant shortage of professionals. There is also a shortage of training and development for new cyber security experts for this field.

9. Is there any particular ‘hurdle’ that readers should be aware of if they are considering moving into digital forensics?

Digital forensics is a burgeoning field with a bright future. It’s being used to identify hackers, fraudsters, and even terrorists. The field is evolving so quickly that it’s hard to keep up with the latest developments. There are different types of digital investigations, including data extraction and computer hacking, which means that no two jobs are alike.

In Need Of Digital Forensics Experts Services?

When you discover that your enterprise has been breached or has been a victim. Remember to reach the Digital Forensics Experts !! East African Data Handlers. Call 0722 435 163 or 0711 051 000. Whatsapp https://wa.me/254722435163
Share this
28 Jun

The Black Hole called Social Media

The Black Hole called Social Media
The advancement in Industry 4.0 and Web 2.0 technologies has significantly increased the acceptance of social media platforms and it has become a primary source of socialization. Users actively share their information, create accounts, and get engage in social forms through these sites. As a result, hackers are exposed to various opportunities to exploit user’s account
The following are some types of social media crimes.
1. Hacking social media
2. Photo Morphing social media
3. Offer & Shopping Scams social media
4. Dating Scams social media
5. Cyber bullying social media
6. Link Baiting social media
Social media forensics involves the application of cyber investigation and digital analysis techniques for: Collecting information from social networking platforms such as –Facebook, Twitter, LinkedIn etc.
  • Storing,
  • Analyzing, and
  • Preserving the information for fighting a case in the court of law
Having a Case that involves Social media? We can help extract information.
Dial.  +254 722 435 163 or +254 711 051 000.
Share this
12 Apr

SNEAK PEAK INTO BUSINESS EMAIL COMPROMISE ATTACKS

SNEAK PEAK INTO BUSINESS EMAIL COMPROMISE ATTACKS

EAST AFRICAN DATA HANDLERS :  Cyber Security Awareness

Business email compromise (BEC) is a type of email cybercrime scam in which an attacker targets a business to defraud the company. Business email compromise is a large and growing problem that targets organizations of all sizes across every industry around the world. It exploits the fact that so many of us rely on email to conduct business—both personal and professional. In a BEC scam, criminals send an email message that appears to come from a known source making a legitimate request.

Types of BEC

  1. CEO Fraud: Here the attackers position themselves as the CEO or executive of a company and typically email an individual within the finance department, requesting funds to be transferred to an account controlled by the attacker.
  2. Account Compromise: An employee’s email account is hacked and is used to request payments to vendors. Payments are then sent to fraudulent bank accounts owned by the attacker.
  3. False Invoice Scheme: Attackers commonly target foreign suppliers through this tactic. The scammer acts as if they are the supplier and request fund transfers to fraudulent accounts.
  4. Attorney Impersonation: This is when an attacker impersonates a lawyer or legal representative. Lower level employees are commonly targeted through these types of attacks where one wouldn’t have the knowledge to question the validity of the request.
  5. Data Theft: These types of attacks typically target HR employees in an attempt to obtain personal or sensitive information about individuals within the company such as CEOs and executives. This data can then be leveraged for future attacks such as CEO Fraud.

How Criminals Carry Out BEC Scams

A scammer might:

  • Spoof an email account or website. Slight variations on legitimate addresses (john.kelly@examplecompany.com vs. john.kelley@examplecompany.com) fool victims into thinking fake accounts are authentic.
  • Send spear phishing emails. These messages look like they’re from a trusted sender to trick victims into revealing confidential information. That information let criminals to access company accounts, calendars, and data that gives them the details they need to carry out the BEC schemes.
  • Use malware. Malicious software can infiltrate company networks and gain access to legitimate email threads about billing and invoices.

How to Protect Yourself against BEC

  1. Be careful with what information you share online or on social media. By openly sharing things like pet names, schools you attended, links to family members, and your birthday, you can give a scammer all the information they need to guess your password or answer your security questions.
  2. Don’t click on anything in an unsolicited email or text message asking you to update or verify account information. Look up the company’s phone number on your own and call the company to ask if the request is legitimate.
  3. Carefully examine the email address, URL, and spelling used in any correspondence. Scammers use slight differences to trick your eye and gain your trust.
  4. Be careful what you download. Never open an email attachment from someone you don’t know, and be wary of email attachments forwarded to you.
  5. Set up two-factor (or multi-factor) authentication on any account that allows it, and never disable it.
  6. Verify payment and purchase requests in person if possible or by calling the person to make sure it is legitimate. You should verify any change in account number or payment procedures with the person making the request.
  7. Be especially wary if the requestor is pressing you to act quickly.

As BEC cybercriminals usually target larger corporations which will potentially lead to bigger pay-outs, the likely reason for the lower proportion of BEC attempts in Africa is the relatively smaller concentration of large businesses and corporations there.

However, there are several offshore companies based in Africa, and the COVID-19 pandemic situation contributed to the increase in this type of cybercrime. Their employees rely heavily on wire transfer transactions, opening up more opportunities for cybercriminals to exploit. Within Africa, it was mainly detected in countries like South Africa, Tunisia, Morocco, Mauritius, Nigeria and Kenya.

 

Looking for Digital Forensics Services in Kenya and Africa? Contact   East African Data Handlers now for unrivalled support! Call 0711 051 000 

Contact us Now



    Your Message

    [recaptcha]

     

    Share this
    22 Jan

    Data expert helping trace data crime

    Data expert helping trace data crime

    On many occasions during tense court proceedings for a Data Crime Related case, George Njoroge, the CEO of East Africa Data Handlers, has felt like punching the air in exasperation as he listened to his lawyer go off-script. In some of those instances, he has ended up losing data litigations he should have won with ease.

    He had lost enough suits by the time he decided to enrol for a law degree at the University of Nairobi two years ago. His vision was not to become a lawyer.

    “I would be very clear about the assignment at hand, but I just could not articulate the brief to the lawyer in proper legal terms. I needed a grasp of the law to be able to instruct my legal team better.”

    Wearing a smile with as much swank as his blue tuxedo, he tells me that helping people and businesses to mitigate different issues through data has been the biggest fulfilment of his life. But his experiences have also been an opportunity to “understand our naivety about the complexities of data.”

    That he is in the right place at the right time could not be truer. Fifteen years ago, he set up East Africa Data Handlers, the only such business in Kenya. For 10 years, the firm built a reputation for helping clients recover lost data.

    Now the business has expanded to six markets in Africa. But the scene is different. He tells me the data recovery segment of the business is no longer viable. “Few people lose their data anymore. Recovering lost data constitutes only about 20 percent of our work or less.”

    Instead, there is an almost infinite and untapped mine in forensics work “which is the future for data professionals.”

    Forensics is exciting, lucrative but a dangerous territory with clientele spanning powerful people, corporations, and State agencies.

    To get a feel of his world, George is hesitant to do this interview in either of his two labs in the city where more than 100 data engineers and analysts, forensics technicians, and reconstruction experts work.

    “This work is sensitive. Essentially, we break into computers to extract vital digital information for use as evidence in court.” The last thing he wants in his labs is prying eyes, I gather.

    On the day of this interview, I run into him in the lift, with a visibly agitated client in tow. From their body language, it is obvious something is off-tangent.

    “Data theft or manipulation often means loss of business or reputation,” he explains about the frantic conversation with the client.

    Many of those who come to see him are in this distraught state. But it is his effortless calm in the face of routine tempests that is admirable about this executive. EADH is betting on two things to grow in this relatively new market; Anton Piller and ransomware decryption.

    “In Anton Piller, data experts search a suspect’s premises, including their computers, to seize evidence needed to prosecute a case.” In this principle, no prior notice is given.

    The company has applied this principle in disputes involving corporations, including one between a leading telco and an associate, and during mergers and acquisitions where skulduggery often thrives.

    “We’ve used Anton Piller to investigate claims of insider trading during a merger between two companies in the energy sector,” he recounts.

    George acknowledges that obtaining evidence this way is often a slippery process, owing to the legal landmines involved. “The product of an [illegal process] is illegality. The first thing you do is to legalise the process by getting a court order from a judge by presenting what you believe is evidence.”

    It is for the same reason that the business runs with exclusivity and, sometimes, secrecy.

    Three years ago, George had toyed with the idea of listing his company. Today, he is glad he held back.

    “Many of the companies who did at the time haven’t gained as much value as the owners had anticipated. Our stock market hasn’t done well in recent years. Privately held companies have dinner better.”

    George does admit, though, that he is an introverted and introspective professional who believes that “things move faster when I act alone.”

    A father of four, he says he wants his children to have a different outlook on education.

    “I want them to appreciate how differently things are done elsewhere and that they can replicate it here by choosing whatever career paths they want.”

    New-age crime

    Nothing excites George quite like the applicability of technology to mitigate issues such as new-age crime.

    Ransomware is his favorite.

    “Today, criminals will hack into a company computer and encrypt their data (putting a password) and then demand a ransom,” he explains.

    For businesses, encryption of their data, usually collected for years, is unthinkable. “It’s this data they use to draw insights that inform their business decisions.”

    As such, many will pay any amount of money to have access to their data “which the hackers have no use for.”

    George says the way of life has made the modern human more vulnerable to data malpractices, mostly because “we’re behavioural and instinctive.”

    Passwords offer little protection for personal data. This is true for individuals and companies.

    “In most cases, the IT manager keeps the password for the company’s computers. Sometimes the password is his girlfriend’s name. You only need to get this detail and all the data is yours to access.”

    This vulnerability will only grow worse in the future. To him, it is up to people to change what details they keep on their phones, for instance. “We’ve our lives compressed in our phones from wallets to personal pictures, certificates, and other documents. This makes us vulnerable.”

    Then there are the deep fakes, which run wide and against which no one is safe. Personalities have fallen victim to the use of footage, images, and audio from different contexts combined to create a narrative that either embarrasses them or hurts their brand.

    “The complexity of telling the difference between what’s authentic and what’s fake is very high today,” George says, revealing that he is currently working on “one of the biggest cases locally” where the data of a business has been compromised.

    He has a name for it: corporate thuggery. “It’s becoming an area of focus for us as a business. We’re constantly working to prove that certain things [about our clients] didn’t happen.”

    On the future of data litigation, George insists that the judge, prosecutor, and lawyer of the future will have to be tech-savvy.

    “I see a possibility where to study law one will be required to have an undergraduate degree in the various disciplines in technology.” His indulgence With nearly 20 timepieces, buying collector watches is George’s way of rewarding himself. He tells me that investing money in property has never appealed to him. If he could, he would invest his wealth in crypto currency, a possibility he has considered since 2015. “When I learnt about it, one Bitcoin cost $2,000 (Sh220,000). Today, the coin costs $50,000 (Sh5.5 million).” Why then didn’t he invest when he had a chance and could afford it?

    “At one point, the crypto market crashed. I was also not sure whether it was the right time to invest. At the time, and even today, I still haven’t figured out how crypto currencies work.”

    A General Election is coming in under seven months, and once again, data on voters is priceless in the development of campaign messaging. It is also a period that is awash with data manipulation, misinformation, and malice. George’s take is straightforward and blunt.

    “The battle will be won digitally. You can’t wish away the power of technology to influence and shape the opinions and actions of people.”

    If hiring a data expert is an expensive undertaking for many businesses, setting up a data department is nearly inconceivable. How has he managed to hire such a large team of highly sought-after professionals?

    George argues that his focus has always been to attract and retain talent. “We’ve been around for 15 years. This has allowed us to develop the right talent and skills.”

    Companies, he says, cannot continue to hold back investment in data.

    “The future of business is in data-driven decision making. It’s in innovation. No CEO can afford to make decisions on a whim anymore. A must-have in many businesses today is an accountant. The must-have in companies of the future will be data analysts.”

     

    Full Interview Courtesy of: Business Daily Africa.

    https://www.businessdailyafrica.com/bd/lifestyle/profiles/data-expert-helping-trace-crime-3688706

    Looking For  Data Digital Forensics Experts in Kenya And Africa”

    Talks to out Data Experts:

    Contact

    +254 722 435 163 or +254 711 051 000.

    WhatsApp Us On https://wa.me/254722435163

     

    Share this
    22 Jun

    9 Reasons Digital Fraud Is On The Rise

    9 Reasons Digital Fraud Is On The Rise.

    What Is Digital Fraud? Digital fraud is when criminals try to use email, websites, malicious software or other methods to learn your personal details or trick you into paying . Digital fraud entails the use of phishing emails, phony websites, bogus mobile apps, fake social media profiles, and other mechanisms to illegally obtain information and defraud consumers and businesses

    1: Chaos caused by the global COVID-19 crisis.

    Opportunistic hackers are taking advantage of the chaotic, global crisis to commit even more fraudulent activity. There is an extensive monitoring going on done by hackers as people work from home with the lockdown, all their digital payments are being monitored, communications and any other activity, hence digital fraud is becoming more rampant.

    2: A changing e-commerce landscape.

    Another trend impacting the rise in digital fraud is more retail purchases shifting online.

    3: The advent of new marketplace platforms.

    From social networks and dating apps to food delivery, alternative transportation, and vacation rentals, digital channels have revolutionized almost every industry. This new platforms are creating stepping stones for trails for digital fraud with baits being set by hackers to lure users with fake pseudo accounts look as if they are genuine.

    4: Payments moving online.

    In addition to consumers transacting more in online marketplaces, they are also using peer-to-peer payment (P2P) and e-Wallet apps more often. The easiest way a digital fraud takes place is interception of the P2P by hackers to divert the funds.

    5:Increasingly digital banking services.

    Today’s consumers demand more online and mobile services from their financial institutions. As a result, legacy banks are going digital. This is opening a Pandora box for hackers to take advantage of loopholes for applications that are not secure enough causing digital fraud to take place.

    6: New consumer expectations.

    Today’s consumers also expect their data to be secure. Yet they will abandon any transaction that takes too long, requires too much data, or is too complex. Whenever a consumer ignores to fully comply to the terms and conditions that help secure a transaction this leads to digital fraud taking place as hackers intercept this  incomplete transactions and change credentials.

    7:More sophisticated fraud tactics.

    Due to an increasing number of data breaches over recent years, fraudsters can more easily access PII (personally identifiable information) and use it against consumers.

    8:Unclear legal jurisdiction of cross-border fraud.

    Global commerce gives today’s online retailers and marketplaces an opportunity to reach even more customers.

    9:Technological advancements.

    Today, digital fraud has also accelerated and grown even more sophisticated due to the rise of e-commerce, mobile payments, and computing power.

    Share this
    08 Jun

    Cyber Attacks Protection

    How to Protect Your Organization Against Cyber Attacks?

    Witnessing the extent of damage cyber attacks can cause should be reason enough to take the necessary preventive measures right away. So, here are some steps you can take to reinforce your organization’s cyber security framework and keep it shielded from cyber attacks.
    1) Generate Cyber Security Awareness:
    2) Implement a Phishing Incident Response Tool for Cyber Attacks
    3) Carry Out Cyber VAPT
    4) Keep the Systems Updated:
    5) Implement MFA: Enable Multi-Factor Authentication (MFA) across all the applicable endpoints of your organization’s networks to prevent Cyber Attacks.

    Conclusion

    So, don’t wait for your company’s name to be on the list of cyber attack victims and take the necessary precautions immediately.
    Would you like Cyber Attacks Protection Services  for the above in your organization?
    For your consultation please call us today on +254 722 435163 or +254 711 051 000. | Talk to our Experts #Fraud #Ransomwar. #cyberattack #cybercrime #hackers #ransomwareremoval #ransomwareattack #hackers Visit us here :https://goo.gl/maps/KcpRLuJBc3qi
    Share this
    16 Feb

    Digital Forensic Laboratory

    Digital Forensic Laboratory

    A digital forensics lab, or otherwise computer forensics lab, refers to a designated location or facility where digital forensics investigations are conducted. In a computer forensics lab (CFL), the certified forensics examiner inspects intrusions, media, audio, intrusions, and any type of cybercrime evidence obtained from the crime scene.

    FUNCTIONS & ROLES

    At EADH’s Digital Forensic Lab we have a team that can help  or aid with an overall function to identify, seize, acquire and analyze all electronic devices related to all cyber-enabled offences reported so as to collect digital evidence which  later can be presented to  the court of law for prosecution purposes.

    COMPUTER FORENSICS

    Our experts  always analyze computer hard drives (workstations, servers, laptops etc.) to look for everything from ex-filtration of data, retrieving data that may be deleted or otherwise maliciously deleted by a user.  We have the  capacity to recovery this evidence from computer storage media.

    MOBILE DEVICE FORENSICS

    Mobile Phone can hold evidence , hence  mobile device forensic analysis  is very vital , in this  smartphones, tablets and other portable devices,   to retrieve any deleted text messages, call logs, documents, mobile browser history, etc. Our team with the help of our special tools, can help do retrieval of data from GPS units, phone system, iPod, mp3 players, USB sticks and flash drives, SD cards, etc.

    MALWARE ANALYSIS

    Malware  analysis  and removal team , support with the study of how the trends of malware and find solutions to remove them. Most in this area related to ransomware cases which we can help do decryption and document the source of train

    COMPUTER INCIDENTS RESPONSE TEAM (CIRT)

    As a both Private and public consultant EADH has a team  of experts who get hired for jobs ( Tasks ) related to Cyber security incidents when they occur. Major roles are : Offer Investigation and analysis, check any security breaches or intrusion incidents, Managing any form  of internal communications and updates during or immediately after incidents, determine what  may have mitigated an incident, offer best recommendations for what technology to use, and help draw policy for clients.

    NETWORK FORENSICS

    In this area our team trace  any E-mail , Social media investigations;  any authentications done and all the messages related to a case are not tampered with or forged. With the help of our Data Recovery team they recover deleted messages from servers, laptops, desktops and any digital electronic devices.

    RESEARCH, TRAINING & DEVELOPMENT

    We can do any identification, coordination  and trace  of all emerging issues within the digital forensics field for you as a client. What it takes us is to identify , assess and train your team after an incident.

     

    OTHER FUNCTIONS

    • We do Digital Forensic examination of computer and mobile phones
    • Help client  preserve and  maintenance of lab processes of acquisition, archival and analysis
    •  Provide solution for  inventories of digital evidence as per standards/ ISO
    • Trace any analysis of deleted and active files
    •  Location and analysis of data in ambient data sources
    • Recovery of deleted or encrypted data/emails, SMS, MMS, videos, internet sites
    • Uncovering passwords
    • Forensic sim card analysis
    • Extraction of data from mobile phones
    • Presentation of expert forensic evidence in court
    Share this