- Identification of Malware and Spyware
- Recover Data from Damaged Media / Devices
- Certified Data and Media / Device Destruction
Identification of Malware and Spyware
Infiltrated by a virus, rootkit, spyware, botnets, steganography, key loggers or rogue applications? We can perform scans of your computer systems and mobile phones for these and many other unauthorized applications. Today’s anti-virus applications are but one defense strategy in a world that demands multiple layers in your security profile to be effective. Sadly, most organizations rely exclusively on a single-layer strategy that leaves holes in your defenses, giving attackers the opportunity to access or steal your data. Our tools and techniques can perform an analysis that off-the-shelf solutions cannot. We also provide analysis services designed specifically for iPhones and smart phones that can identify malware that is hidden deep within the operating system.
Recover Data from Damaged Media / Devices
In more extreme cases of physical damage, there are methods of recovering data from physical devices that have been damaged. Our tools and techniques may be able to restore data from damaged hard disks, optical drives, and flash media. For severe cases, our partners meet ISO 14644-1, HIPAA, and SAS 70 certifications to securely locate and recover your data. We will also work directly with the hardware and media manufacturers in an effort to successfully accomplish even the most problematic data recovery job.
Certified Data and Media / Device Destruction
We provide certified data destruction using various techniques and tools to “digitally shred” your data, perform physical destruction of hard drives and media, and prepare obsolete computers for re-use and corporate giving (donation to schools, charities). We provide a notarized certificate/affidavit attesting to the media destroyed, the method utilized, and all other pertinent information. Protecting your business data is especially critical if you fall under HIPAA, FACTA, GLB, SOX or PCI regulations. Our methods of digital shredding (wiping, clearing, sanitizing) meet or exceed standards published by: NIST SP800-88, Department of Defense (DoD) Standard 5220.22-M, and others. We guarantee the destruction of your data and media.