CYTER Forensic Technology uncovers the truth by reconstructing events from electronic data sourced from digital devices, networked systems, cloud systems and social media.
- Forensically examine computers / laptops / notebooks / smart phones / tablets to reconstruct user activity.
- Forensically examine data from cloud-based systems such as cloud storage and or online collaborative systems.
- Forensically examine data from social media to identify and reconstruct individual relationships and or social networks.
- Forensically examine network systems to reconstruct past events.
- Forensically analyse log files to identify patterns of activity linked to events of interest.
- Provide oversight to IT teams undertaking internal investigations in response to events involving employee misbehavior.
- Conduct online forensic analysis to establish the ownership and or sources of online content; Relationships between entities; Map IT environments; Establish the authenticity of online content.