In the electronic world of doing business, you rely on computers and information to help propel your company to corporate success. So what does this have to do with computer forensics? Because bad things happen to good companies!
Those same computers that keep track of your financial health can be used to propel your company into the world of financial fraud. Your company’s server could be storing illegal, unsavoury and ill-gotten materials without your knowledge.
Or those same computers could be victims of crimes themselves. In fact, one of the most common questions businesses ask is: Did this employee take any documents before leaving?
CENCOM can make a forensically sound image of the hard drive of any employee leaving the company. This image is held by us should you need to have a complete forensic analysis performed. This approach gives you a sort of insurance policy in the event that litigation ensues.
Besides safeguarding your legal options, computer forensics can:
"It is a wicked world, and when clever man turns his brain to crime it is the worst of all."
Should you use your in-house IT staff to investigate a breach of your acceptable use policy or an incident involving your IT resources? In most cases the answer is no. Any evidence gathered by in-house staff could become inadmissible in a court of law. In fact, potential evidence could be destroyed by an IT staffer untrained in computer forensic protocols and procedures. Is that a risk you want to take?
An improperly handled computer forensic examination could also result in the opposing counsel to allege alteration or fabrication of evidence. In other words, hiring a professionally trained computer forensics expert can help you avoid unnecessary legalities -- and lessen the financial burden.