You are here
Forensics Lab Services
Hackers are for real and they will have no mercy on your servers. It can happen to anyone and it is a complicated situation. But what do you do once you have been attacked? Valuable evidence can give you a lot of useful knowledge and ensure proper legal documentation to ensure a subsequent trial against the perpetrators.
This service is unique to the Mauritian island and surrounding areas; underpinned by our leading industry experience, based on years of specialising in malware analysis and reverse engineering, AvauntGuard Ltd. has its own forensic lab where our experts are able to quickly identify the source of your infection and advise you how to prevent/avoid further attacks. This can be done either by our experts directly on site within your organisation or in our own specialised lab.
By taking safety measures after an adverse event, it shows your organization takes care of its services, delivery commitments and the stakeholders as well as the customers. Forensic investigation is therefore an investment in the company's current and future security.
- Our experienced IT security consultants can review the IT system and find incriminating evidence.
- We understand which factors make it admissible in court both during and after the initial gathering of evidence.
The suspicion that a PC system has been compromised either by hackers or by “perhaps earlier internal employees” raises, a number of important decisions to be taken within a short time:
- Can your organisation’s IT system be shut down without affecting the other business operations?
- What consequences can incidents have for the other elements of IT infrastructure within the company?
- Does the hacked Web server expose guests at the home company to dangers, such as sql injection, drive-by attacks and other form of malicious attacks?
These questions require a critical position to be taken by responsible parties of the IT system brought down after an attack, Including on how volatile data(e.g. the system's RAM memory) can be recovered. Our experience tells us that it is often here in an IT system, where we can find some important clues and evidence on what has happened.