Surveillance & Technology: What can investigators do when watching you?

A large part of investigators work is surveillance, and as technology advances, the definition of surveillance is rapidly changing. Surveillance is progressing passed stakeouts and physical location updates. Rather, surveillance is expanding to online activity, GPS tracking, and public recordings. Technology can make surveillance easier for investigators but they must be up to date on…

Cybersecurity: Penetration Testing

Our Process Discovery Execute Review Regardless which type of penetration you choose, they all begin with Discovery and Data Collection. We collect data through various techniques and sources through interviews, social engineering, systems and network reconnaissance, data analysis, information provided by the client such as IP addresses, network diagrams, and application information. We then develop…

Cybersecurity: Threat Hunting

In today’s landscape, a network breach or unauthorized access can often go on for weeks or months without detection. So how do you know if you have been breached? Security Testing and Threat Hunting Is all the money, time and effort you are putting into cybersecurity effective? Despite all the layers of security and training…