Investigation of IS incidents
Our experts determine the reasons and methods of an attack
Over 80 000 cyberattacks occur daily
On investigation of IS incidents
Protect yourself and your business
The Center’s experts provide services of investigating the incidents related to unauthorized access, deletion, modification of data, identification of the facts of penetration and infection with specialized malicious software\n\nAs part of the services, we conduct the following work:
Network activity analysis
Log analysis
Databases
Recover deleted information
Search and localize the attack vector
Identify leaks of personal and confidential data
Reveal the facts of failure of the technical security support systems and other equipment
Identify fraudulent transactions in credit and financial systems
Reconstructing an incident
A competent approach to collection of digital evidence not only will allow to reconstruct the incident, but also enable to reveal the ways and background for occurrence of the incident.