Our investigators create an exact duplicate of the media in question using a hard drive duplicator or specialized softwares. To prevent tampering, the original media is secured in a safe place and only the duplicate copy is used for analysis
The duplicated files or evidence are then analysed by our forensic specialists, who keep track of any evidence that supports or refutes a hypothesis. Continuous analysis is carried out to reconstruct events and actions as happened during the incident, in order to create a timeline and conclude on what has occurred and how hackers gained access to the systems
Once a digital forensics investigation is completed, the findings and conclusions uncovered by analysts are presented with an executive summary in the form of a report that is easy to understand by executives and non-technical personnel.