Cybersecurity
Incident Response
If, unfortunately, you have been the target of a cyberattack and you need a deep investigation to detect and document the motive, the offenders, and the consequences of such security incident, we will take care of everything.
We compile all the information, proof, and IT systems activity of any device (networks, computers, mobile phones, tablets, or any other connected devices) respecting a proper custody chain.
Our forensic experts will identify fraud events and make a partial report with evidence and proof to be used in trials and lawsuits.
