Q Why don't I wait until something happens?
A Prevention is always better than cure. Being a member will act as a deterrent and give your organisation a positive image.
Q I'll join when I think something has happened.
A Your membership application will need to be processed and your period of membership can only start only after a short qualification period. Incidents that occur prior to your membership period may not be covered.
Q Will we need it if we've got good firewalls and security?
A More than 90% of all incidents are internal and therefore cannot, and are not, prevented by firewalls and other security.
Q My IT guys can deal with this.
A Your IT staff are undoubtedly great at maintaining and securing your network. Investigating workplace disputes and the corresponding computer evidence are a completely different set of skills.
Q We don't believe in "big brother" monitoring of our staff.
A Computer Forensic services are not about "monitoring". It is about responding ethically and professionally to incidents when they do happen. Every manager has a duty of care to deal with these incidents when they happen. We just help you do so.
A Last year 93% of the cases that our senior investigators dealt with involved an employee or ex-employee. Staff come and they go. A recent survey showed that 69% of employees believed that it was acceptable to take valuable information with them when they left a company. No matter how much you may trust your staff, disputes and incidents will always happen.
Q We don't have enough staff to need this.
A Last year 47% of the cases that our senior investigators dealt with involved companies employing less than 20 people. It only takes one person.
You will need computer forensics not just for those workplace disputes but also when someone steals, or tries to steal, your valuable and sensitive information or makes an allegation about you, your staff or something that otherwise involves your company.
Q Do you know what you are doing?
A Quite simply - yes we do. Our senior investigators are drawn from law enforcement, military and IT Security backgrounds. They have countless years of experience and have pioneered the development of the methods and means through which computer evidence can be investigated. Details of the personal profiles of some of our key staff are available on request.