information

  • Permalink Gallery

    Computer Forensics Specialists Can Remove Spyware From Mobile Worker’s Machines

Computer Forensics Specialists Can Remove Spyware From Mobile Worker’s Machines

Over the last few years something has happened in the business world – workers have become mobile. Unfettered through computers and use of the cloud, the old 9-5 doesn’t have to be within the confines of office walls.

With that freedom have come other issues.

One of the biggest issues is the protection of corporate assets. While workers have become mobile, they are carrying confidential corporate assets in the form of information with them on their computer and laptops. Those assets could include many things:

actual computer hardware (theft from cars, restaurants, airports, etc.)
client lists
sales data
financial data
product research and development
employee personnel information

Computers and laptops are routinely stolen. But the thefts of hardware are usually just to get the computer – laptop, notebook, notepad or phone – to [...]

May 10th, 2012|Computer Forensics|
  • Permalink Gallery

    Oh, the Secrets a Computer Reveals in a Computer Forensic Examination

Oh, the Secrets a Computer Reveals in a Computer Forensic Examination

We recently had a client who came to us unhappy – and angry.

The business owner was unhappy because he had lost a key employee in his company. But worse than that, he was angry because the employee had started a competing company and the owner suspected the new company was started not only while the worker was still employed by him, but using his firm’s trade secrets, equipment and resources.

He just couldn’t prove it. At least not with enough evidence for his attorney. Of course, the employee denied it when confronted.

Through a computer forensic examination, we were able to uncover documents and communications (e-mails and reports) that brought the truth out. The employee had started his new company before leaving the old one and [...]

May 3rd, 2012|Computer Forensics|