Digital Incident Response
Uncovering The Truth!
Recovery and investigation of material found in digital devices.
Computer Forensics Examiner
- Computer Forensics
- Mobile Device Forensics
- Forensically Sound Data Acquisition
- Digital Security Consulting
- Evidence Examination and Analysis
- Recovery Of Deleted Data
- Corporate Investigations
- Details below
What we do
Genusys can collect, analyze and report on digital data in a way that is forensically sound and reproducible. The data and reports can then be used in the detection and prevention of crime or in any dispute where evidence is stored digitally.
MOBILE DEVICE FORENSICS
Genusys can collect, analyze and report on digital data from a mobile device under forensically sound conditions. Mobile devices that Genusys can perform forensics on include mobile phones, PDA devices, GPS devices and tablet computers.
FORENSICALLY SOUND DATA ACQUISITION
Genusys can make a forensic image from computer media such as hard drives, USB drives, removable hard drives, servers and other media that store electronic data including mobile devices, gaming consoles and other devices.
DIGITAL SECURITY CONSULTING
- Departing employee advice
- Security advice
- Data acquisition
- Examination of other’s evidence
EVIDENCE EXAMINATION AND ANALYSIS
Genusys uses current state of the market commercial tools and an assortment of the most current manual techniques to analyze and report on digital evidence whether collected by Genusys or from other sources.
Who we are
Genusys has been providing technology and security support to companies large and small since 1998. Our technical expertise and business experience uniquely position us to handle all your digital forensics’ issues with professionalism and in confidence.
Genusys Digital Forensics was founded by Richard McElroy, a GIAC Certified Computer Forensics Examiner. He was trained at the SANS Institute, the world’s premier security training organization. Mr. McElroy brings his extensive technical experience and knowledge of today’s current digital forensics tools and techniques to your specific situation.
- An employee has used a computer or mobile device belonging to your company for an illicit purpose.
- You need to recover digital evidence discreetly with minimal disruption to your business.
- An employee is suspected of stealing confidential information.
- You need to recover data or emails that were maliciously deleted.
- You need a digital forensics expert to examine digital evidence.
- You suspect malware or spyware on a device.
- You need to recover evidence of hidden assets
Reasons for using a digital forensics expert
DEPARTING EMPLOYEE TRIAGE
- Collect a forensically sound image of the computer or device beginning the chain of custody process before any possible disputes arise.
- Assess if the employee deleted any data.
- Uncover if data was copied to an eternal destination.
- Discover if competitive data was taken before the exit.
- Uncover any suspicious communications whether email or chat.
INTERNAL CORPORATE INVESTIGATIONS
- Put a wall between your company and the investigation to avoid future biased investigation accusations.
- Discover if a key employee is preparing to leave your employ.
- Confirm if an employee stole important data.
- Uncover if an employee is working a side job on company time.
- Expose if an employee violated company internet policies.
- Uncover if an employee is accessing data they are not entitled to access.
- Confirm if an employee is harassing another employee.
INTELLECTUAL PROPERTY THEFT
- Uncover if sensitive data has been accessed.
- Track down if malware/spyware is stealing secrets.
- Discover if an employee is stealing critical data.
DIVORCE AND FAMILY LAW
- Work in conjunction with legal advisor.
- Uncover evidence of hidden assets.
- Uncover evidence of remote monitoring and spyware.
- Determine patterns of computer usage.
- Consultations on individual digital protection strategies.
RECOVERY OF DELETED DATA
- Recover deleted files, pictures and application data.
- Recover email, file and chat fragments.
- Recover deleted internet history.
- USB activity
- Wireless connections
- Internet history
- Recent file activity
- Thumb caches
- Hidden/encrypted files
- Evidence of forensics evasion
- Patterns of activity
- Chat sessions
- SMS and MMS messaging
- Call logs
- Contact lists
- Phone IMEI/ESN information.
- Web browsing
- Wireless network settings
- Geolocation information (including geotags contained within image metadata)