top of page


We offer a range of bespoke services to corporations to help protect them from bad actors within the organisation. We offer measured, proactive initiatives to detect when damaging events are either occurring or imminent, such as:

Financial misappropriation

Bugging & Eavesdropping

Leak of sensitive information

Data exfiltration

Intellectual Property (IP) theft


Gardening Leave

Wrongful death

Loss of trade secrets

Personal injury

Dissemination of customer databases

Employee misconduct

Sexual Harassment

Data Recovery of lost or hidden files


Leak post-mortems: Who was responsible?


Litigation- wrongful dismissal actions

Asset misuse

Industrial Espionage

Malware attacks

As every organisation is different so too are the paths through which damaging losses occur and, indeed, the level of damage such leaks may pose.
For this reason, we encourage interested parties to contact us without delay and be proactive about protecting your firm. This applies whether you are aware of an issue or whether you wish to engage us to avoid one.

Contact us to discuss your requirements.


Any engagement between interested parties and ourselves commences with a strictly confidential meeting.
We understand that clients may need to tread carefully when managing a developing situation. For this reason, it is always good practice for executives to contact us using phones / computers and email services which are outside of the company network.
We can arrange discrete, offsite meetings at our anonymised offices at a convenient time to promote confidentiality. These can be arranged in or outside normal business hours, including weekends.


Our Digital Forensics Incident Response ( DFIR ) team is highly experienced, equipped with a broad range of technology for the analysis of digital equipment across multiple platforms including, but not limited to:


Hard Drives (HDD & SSD)

Electronic Control Units



Infotainment Systems


Cellular phones and devices

Intruder Alarm System Logs

Fixed telephone Systems

GPS Tracking Systems

Memory sticks

CCTV Systems

Depending on the application, we use a combination of hardware and software tools to carefully mine the data contained in such devices. The output is then analysed with appropriate filtering to separate wheat from chaff. A good example of this is where Forensic Accounting practices require data which may not immediately apparent or accessible.

Contact us to discuss your requirements.


Broadly speaking, Digital Forensics ( DF ) can be leveraged to proactively prevent leaks or cyber security incidents and monitor outflows of data from an entity. Of course, similar methodologies are employed reactively as Incident Response ( IR ) to complete the acronym, DFIR. Collectively, both are used to help a firm with:

Damage control

Preservation of corporate reputation

Mitigation of loss



New forms of technology are playing an ever-increasing role in corporations. With this expansion, the importance & complexity of digital forensics grows. The evidence formats or types and digital artifacts acquired from the growth of devices, cloud services and software is constantly evolving.
The effective performance of DFIR services demands eclectic skillsets, drawing upon an understanding of IT, investigation techniques, cyber-crime and human psychology. To remain effective with the rapid pace of technological advancement, a constant evolution on the part of digital forensic practitioners is demanded. Equally, for clients to benefit from robust defence and limit the risk of loss, it is imperative that they seek engagement with us at as early a stage as possible.

bottom of page