No trace is too small, no detail too insignificant – we reconstruct the digital puzzle. Our Digital Forensics Team specializes in systematically and seamlessly preserving digital evidence and creating court-proof reconstructions of events. With years of experience, we can provide you with an accurate analysis and solutions for complex cases. You can rely on our expertise to ensure that not a single digital trace is lost.
Digital forensics plays a critical role in the detection and investigation of cybercrime, data breaches, and other criminal digital incidents. It includes techniques for preserving, analyzing, and interpreting digital evidence resulting from criminal activity or IT security breaches. The goal is to analyze and resolve hacking, data theft, data leakage, or fraud using digital evidence.
IT forensic investigations necessitate a deep understanding of both the methodologies and the regulatory standards essential for maintaining the integrity of evidence. To achieve this, Oneconsult has a highly specialized and multi-certified forensics team, complemented by a state-of-the-art forensics laboratory that is fully equipped and rigorously secured for conducting thorough analyses.
A digital forensic investigation usually starts with securing digital evidence to prevent data from being altered or deleted. The secured data is then analyzed to extract relevant information and evidence. Forensic processes and approved tools are applied and used to recover deleted files, analyze metadata, examine network communications and identify suspicious activity. The results are documented and can be used as evidence in legal proceedings.
Ideally, a digital forensic investigation provides answers to the “Five Ws”:
For non-specialists, it is often surprising how much information can be obtained from the systems. However, this requires that the relevant data is collected on the systems to be investigated, such as log files that provide information about logins and logouts, connections or programs that were executed. To ensure that sufficient data from the systems in question is available in the event of an emergency, it is advisable to implement an appropriate logging strategy.
There are numerous use cases. Below are some example scenarios in which a digital forensic investigation is recommended:
In addition, an investigation is required by law in all cases where there is a high probability or even proof that a system has been compromised. An obligation to investigate may arise from Art. 32, 33 and 34 GDPR (EU) or Art. 24 FADP (Switzerland), among others.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: