More now than ever, computers are either the target of malicious activity or the means by which such activity takes place. In both cases perpetrators often use sophisticated means to hide the “who, what, when, and where” of their actions. This makes cyber investigations especially challenging, technically demanding, and beyond the scope of many investigation firms.

  • Spyware     
  • Online impersonation     
  • Phishing attacks     
  • Intellectual property theft     
  • Violations of Acceptable Use Policies
  • Hacking     
  • Unauthorized account access     
  • Data breaches     
  • Cyber-stalking     
  • Malware