Why hire Verdolino & Lowey, P.C. for your Computer Forensic needs?
- Our examiners are not point-and-click examiners. They have the technical knowledge and training to understand and explain the results yielded from the software used during the examinations.
- Unlike larger firms, our clients deal directly with the examiner.
- Verdolino & Lowey, P.C. examiners are trained, experienced, and certified in the software they utilize and the operating systems they examine. This includes certifications through Guidance Software, Microsoft, and CompTIA.
What is Computer Forensics?
Computer forensics is the analysis of information created and stored on computer systems. It involves the usage of industry-accepted techniques to aid in the identification, preservation, collection, examination, analysis, and presentation of digital evidence. Type of electronic data that could be introduced as evidence include:
- Instant Messaging logs
- Security logs
- Electronic faxes
- Video or audio files
- Spreadsheets, word processing documents, databases, etc
- Deleted documents
- Malicious software applications (peer-to-peer file sharing applications, spyware, viruses, keyloggers, network sniffers, programs violating an Acceptable Usage Policy, etc.)
- Password protected files
- Encrypted files
- Altered documents
What Are the Applications of Computer Forensics?
There are a variety of situations in which the services of a forensic investigator would be useful. These include, but are not limited to, the following:
- Financial fraud
- Insurance fraud
- Theft of intellectual property or trade secret information
- Theft of financial data (credit card numbers, bank account numbers, etc)
- Email usage that violates an acceptable usage policy
- Internet usage that violates an acceptable usage policy
- Forbidden access of confidential information on a corporate network
What if Financial Fraud is Suspected?
You can find out more about that area of our practice in the Forensic Accounting section of our website.