Frequently Asked Questions (FAQ)

What is IT forensics (digital forensics or computer forensics)?

Utilizing specialized investigative and analytical methods, we meticulously gather and preserve evidence from digital media to ensure its admissibility in a court of law. Through our methodical approach, we can consistently ensure complete documentation and preservation of the chain of evidence. Utilizing specialized tools, we aim to accurately determine the events that transpired on the targeted IT system and, where applicable, identify those responsible. Depending on the nature and extent of the information at hand, specialized analysis software may be employed. Aligned with the defined objectives of the investigation, our findings are compiled into a legally compliant report that meets all evidentiary requirements.

When do you need IT forensics services and how do you benefit from them?

IT forensics, digital forensics or computer forensics supports the clarification of irregularities in connection with electronic information that is available on a wide variety of digital data carriers. The securing and analysis of electronically available data can be of importance in various contexts. A non-binding discussion about your needs and concerns will help you to find out whether our services can be of use in your case. In a first step, a copy of the digital data carrier to be examined is created. This backup copy forms the basis for the creation of "back-ups". The forensic evaluation of the existing information is then performed on these "back-ups". As a result, the original information remains untouched. Special software, hardware and techniques are used for this work. The operation of these tools requires appropriate qualifications and many years of experience, which our investigators have. Depending on the scope and content of the information available, special review software (eDiscovery) is used. Depending on the objective of the investigation, the result of the evaluation is summarized in a report that meets the relevant legal requirements.

When should an IT forensic expert be called in?

In the event of a suspicion of irregularities related to personal or organization-related electronic information, it is worth consulting an IT forensics expert as soon as possible. In cases of suspicion, Forentec is available to you at any time for a non-binding consultation, an initial assessment of your individual situation and a discussion of possible and sensible measures. By contacting us without obligation and carrying out a brief analysis, you can avoid the risk of inadvertently destroying valuable electronic evidence by accessing the IT equipment in question yourself. In the case of suspicion, the rapid consultation and assessment by an IT forensic expert forms the basis for a successful investigation result.

How is my business data kept secure at Forentec?

At Forentec, your data is stored and examined with the utmost care and under appropriate security precautions in a secure IT forensic laboratory set up specifically for this purpose. Access is granted exclusively to Forentec employees. In particularly sensitive cases, we offer customized solutions at different security levels. Our mobile IT forensics laboratory also enables us to carry out necessary forensic work directly at our customers' premises.

How long does IT forensics work take and how much does it cost?

The duration and costs incurred for IT forensics work within the scope of a specific project depend on a variety of factors. Without a personal discussion and the clarification of certain key points, no binding information can be provided in this regard. In order to be able to prepare an individual offer with a corresponding cost estimate for a project, elements such as the amount of data, specified deadlines and the complexity of the work are particularly decisive. Our powerful tools ensure an efficient approach that minimizes work time and associated costs accordingly. Forentec's lean structure allows us to offer fair rates within a transparent pricing model. Our model guarantees the absolute independence of our consultancy and ensures maximum transparency regarding all the costs of the joint project.

Will an IT forensics project run in my organization disrupt day-to-day business?

Within the scope of our work, we exert as little influence as possible on your organization and day-to-day business. Forentec has a flexible team that will discuss the planning of the assignment in detail with you in advance in order to clarify your individual needs, expectations and requirements. Our flexibility also allows us to work outside normal business hours. This minimizes disruptions to your day-to-day business and prevents unnecessary attention.

Can important digital evidence be found on mobile devices?

The amount of digital evidence on mobile devices has grown exponentially in recent years and continues to rise. Often, the data available on different data carriers is interconnected (synchronized), so that the backup and evaluation of mobile devices has become more complex and demanding. However, Forentec is able to backup, prepare and analyze data and corresponding electronic evidence from a wide variety of data carriers such as servers, cloud storage, removable media such as USB sticks or external hard drives, GPS, vehicle multimedia systems, tablets, iPads as well as smartphones such as iPhone, Samsung Galaxy, Blackberry, Windows phones and Android phones.

Does anyone have access to my email account? Is someone reading my e-mails?

Forentec offers various tools and methods to help verify whether unauthorized access to your email account has occurred. For example, depending on the specifics of your case, we may analyze information from local web browsers, event logs, and web mail records to determine if unauthorized access to personal or organizational data has occurred.

Can Forentec forensically secure profiles, posts and other shared information from Facebook or other social media sites?

Yes. Forentec has the technical capabilities to forensically secure various data from social networking websites. Depending on the case, social media data can be secured even if the particular account is blocked from the public.

Do you have any other questions?


Book an appointment with one of our experts.