Digital Forensic Investigations
Uncovering Digital Clues
To Protect Your Business
While the need for computer forensic investigation often comes out of the blue, the need for results tends to be urgent. Forensic Control provides you with a dedicated team of experts to help you take back control.
Digital evidence can often make or break cases – but it must be preserved quickly, extracted, analysed and presented to an exacting standard for it to be legally admissible.
Our digital forensics investigators are some of the leading computer forensic experts in the UK, and have provided evidence on hundreds of cases for corporate, private and legal clients. We handle in all types of cases including:
Our work is carried out in accordance with the Association of Chief Police Officers’
Good Practice Guide for Digital Evidence
Intellectual Property (IP) theft
Data breaches
Cyber attacks
Misconduct
Abuse
Fraud
Talk to us about an investigation
Why work with Forensic Control?
- Expert: We have decades’ experience from police and military backgrounds
- Easy: We provide an efficient, smooth and stress-free process
- Careful: We handle your case with discretion and care
- Control: We help you regain control following an incident, giving your organisation peace of mind
How we work
Our team uses the latest computer forensics applications, technology, and processes to ensure that we create a comprehensive account of any incident. We tailor our approach according to the needs of each case, including:
- Data collection
- Device imaging (forensically sound acquisition of data)
- Deleted data recovery
- Data identification
- Data analysis
- Detailed reporting
Collecting data
Gathering data quickly is key to preventing tampering or destruction. We can come to you, receive your devices at our offices in London, or collect remotely from Microsoft Office 365, Google Workspace, Dropbox and other cloud services.
Device imaging
Disk imaging involves creating an exact forensic replica of data stored on a computer, mobile phone, memory stick or other device. The replicated data is then used in our analysis. Preserving original data is just one of the measures we take to make sure that our forensic analysis can be admissible evidence in court.
Recovering deleted data
Gone for good? Not always. Deleted doesn’t always mean unrecoverable. We can identify and recover files and other data that have been deleted from a system. Such data are often key to identifying and understanding incidents of misconduct.
Data identification
We search, identify, and categorise all relevant data to the investigation. Our rigorous techniques extract chat logs, email chains and show how, and when data has been moved. We leave no stone unturned to piece together a past incident. If the data exists, we will find it.
Data analysis
Using industry-leading tools, our computer forensics investigators analyse data in line with client requirements. Piecing together retrieved data can help identify possible suspects, uncover patterns of misconduct, and evidence of fraud. Years of experience means our investigators can do this quickly, and instinctively.
Reporting – in plain English
At the end of the process, we will submit a detailed, easy-to-understand report outlining our findings and assessing the evidence that we discovered during the digital forensic investigation. We’ll explain how our findings can support your claim, and help you to decide how best to proceed.
Happy Clients
Supporting our clients with down to earth advice, explained simply, is our mission. Don’t just take our word for it though. Here are a handful of our testimonials from clients we work with.
"Expert and friendly support towards our achieving Cyber Essentials Plus certification. Clearly laid out the expectations for meeting the standards and navigated us through. Kept us on track even when business demands were pulling our attention elsewhere. Delighted to have the certification but our business gained a great deal from the journey too."
Lee Bartmanis, Head of Operations, Nurole
"I highly recommend Forensic Control to any organization seeking top-tier cyber security services. Their well-coordinated process, insightful guidance, and refreshing approach to cyber security set them apart. They are true experts in their field, and we are grateful for their invaluable contributions to our company's cyber security journey.
Five stars and a heartfelt thank you to Forensic Control and the entire team!"
Elon Schutze, Services Director, Know Why BV
Adam Maxwell, Security Specialist, Jisc
An Le, IT Security Analyst, Save the Children
“Highly recommended Forensic Control. From the very start of our CE+ journey, Jonathan was providing tremendous service to us in order to ensure we had all the necessary information and advice specific to our company. They was consistently providing clear and helpful guidance in order for us to best succeed with our certification and as such had a great outcome! Big thanks to Jonathan and Forensic Control.”
Christopher Price, Technical Operations Lead, Faculty
“We had our Cyber Essentials Plus certification done by Jonathan and his team. Quick responses and professional advice that went further than the scope. Brilliant service and aftercare. Going forward, we will be using Forensic Control services.”
Maris Hakman, The Royal Foundation
"Forensic Control is a firm of professional cyber security advisers who guided our organisation achieve a ISO equivalent i.e. IASME Gold Standard accreditation over an 18 month period. Their service added a lot of value to our IT Governance and overall organisational security awareness and competencies."
Selam Shibru, Bank Worker’s Charity
"Forensic Control have been professional, efficient and very responsive in any queries we had in regards to the company gaining it’s Cyber Essentials qualification. We are continuing to use their services to progress to Cyber Essentials Plus. Highly recommend”
Francesca MacLeod, Cordless Consultant
“We are a small company that relies on the security of our data. Forensic Control has been perfect at keeping us protected and up to date with all the latest trends. Very efficient when we have needed help.”
Andy Bibby, CEO 87%
Frequently asked Questions
We’re here to help with any questions you have about plans, pricing and supported features.
Digital Forensics
Digital (also known as Computer) Forensics is the process of collecting, preserving, analysing, and presenting digital evidence in a legally admissible manner. It involves investigating and recovering data from digital devices such as computers, servers, mobile devices, and network logs to uncover evidence of cyber crimes, data breaches, or unauthorised activities. Digital Forensics is important for your organisation as it helps you understand the scope and impact of a security incident, enables identification of the responsible parties, and provides evidence for legal proceedings if necessary. It plays a crucial role in incident response, threat investigations, and ensuring accountability.
The Computer Forensics process typically involves several key steps. First, the forensic experts analyse the specific requirements of your case and determine the most appropriate methodology and tools to use. They then collect and preserve digital evidence, ensuring its integrity and maintaining a documented chain of custody. Next, they conduct a detailed analysis of the evidence, employing various techniques to recover and examine relevant data. This may involve examining file systems, network logs, memory dumps, or even conducting advanced data recovery techniques. Finally, the findings are documented in a comprehensive report, which includes an explanation of the findings, analysis, and any recommendations or actions to be taken.
It’s not recommended that your inhouse IT department carries out any forensic analysis for two reasons. While they may be highly technically competent, it is unlikely that they understand the consequences of their actions. Even turning on a computer to “have a look” can destroy previously existing information that might have been crucial to what you are looking to prove.
Secondly, if the analysis is carried out by your IT team, not only will the completeness and accuracy of their findings be open to doubt, their integrity will be subject to question as they are not independent of the organisation – you can’t be the police and the judge!
Engaging Digital Forensics services is recommended in various scenarios, including:
a. Incident Response: When your organisation experiences a security incident, such as a data breach, unauthorised access, or a cyberattack, Digital Forensics services can help investigate the incident, identify the root cause, and collect evidence for remediation and legal purposes.
b. Litigation Support: If your organisation is involved in a legal dispute where digital evidence is relevant, Digital Forensics services can assist in collecting, analysing, and presenting the necessary evidence to support your case.
c. Employee Misconduct: When there are suspicions or allegations of employee misconduct, such as unauthorised data access or intellectual property theft, Digital Forensics services can help gather evidence, determine the extent of the misconduct, and assist in disciplinary or legal actions.
d. Compliance Requirements: In regulated industries or organisations subject to compliance standards, Digital Forensics services can help ensure adherence to regulatory requirements by conducting periodic audits, investigations, or due diligence.