contact@cyfor.co.uk

Manchester: 0161 797 8123London: 0207 438 2045

contact@cyfor.co.uk
Manchester: 0161 797 8123
London: 0207 438 2045

Employee Investigations


Protecting your business interests and reducing the risk of potential employee misconduct.


We understand the importance of protecting the integrity of your organisation’s data across all departments.

That is why we offer a unique range of bespoke computer and mobile forensic packages designed to facilitate your requirements. These provide added reassurance in the event of an employee leaving unexpectedly, either to a competitor or via resignation or dismissal.

Our team of highly qualified investigators use the latest technology and digital forensic techniques to discover all potential evidence within a wide range of corporate investigations. Extensive forensic capabilities developed since 2002 allow us to recover, image and analyse a variety range of electronically stored information, with all investigations supplemented with a detailed, court suitable report.


Employee Leavers Packages

 

A detailed bespoke workflow to secure company data when an employee resigns or is dismissed.
Forensically image (exact copy with preserved metadata) one PC/laptop per month.
Extraction of entire employee mailbox for presentation or potential analysis.
Full summary analysis of computer operating system and configuration.
Analysis of one user-account for activity in the month leading-up to notice date, including;
- USB activity analysis
- Internet history investigation
- Analysis of email activity
- Search and recover deleted data
- Bulk printing activity analysis
- Keyword search
Forensic image of one mobile phone for preservation or analysis.
Report of findings (suitable for use in court).
Highly secure storage of preserved ex-employee data for 6 months, for potential future analysis.
Comprehensive computer analysis of up to three employees per month.
Comprehensive computer analysis of more than three employees per month.
Upload collected data onto online review platform for search and analysis.
Staff training on computer security and protecting confidential information.
Cyber Essentials Accreditation.
Quarterly Cyber Security Audit.

Standard

A detailed bespoke workflow to secure company data when an employee resigns or is dismissed.
Forensically image (exact copy with preserved metadata) one PC/laptop per month.
Extraction of entire employee mailbox for presentation or potential analysis.
Full summary analysis of computer operating system and configuration.
Analysis of one user-account for activity in the month leading-up to notice date, including;
- USB activity analysis
- Internet history investigation
- Analysis of email activity
- Search and recover deleted data
- Bulk printing activity analysis
- Keyword search
Forensic image of one mobile phone for preservation or analysis.
Report of findings (suitable for use in court).

Advanced

A detailed bespoke workflow to secure company data when an employee resigns or is dismissed.
Forensically image (exact copy with preserved metadata) one PC/laptop per month.
Extraction of entire employee mailbox for presentation or potential analysis.
Full summary analysis of computer operating system and configuration.
Analysis of one user-account for activity in the month leading-up to notice date, including;
- USB activity analysis
- Internet history investigation
- Analysis of email activity
- Search and recover deleted data
- Bulk printing activity analysis
- Keyword search
Forensic image of one mobile phone for preservation or analysis.
Report of findings (suitable for use in court).
Highly secure storage of preserved ex-employee data for 6 months, for potential future analysis.
Comprehensive computer analysis of up to three employees per month.
Comprehensive computer analysis of more than three employees per month.

Premium

A detailed bespoke workflow to secure company data when an employee resigns or is dismissed.
Forensically image (exact copy with preserved metadata) one PC/laptop per month.
Extraction of entire employee mailbox for presentation or potential analysis.
Full summary analysis of computer operating system and configuration.
Analysis of one user-account for activity in the month leading-up to notice date, including;
- USB activity analysis
- Internet history investigation
- Analysis of email activity
- Search and recover deleted data
- Bulk printing activity analysis
- Keyword search
Forensic image of one mobile phone for preservation or analysis.
Report of findings (suitable for use in court).
Highly secure storage of preserved ex-employee data for 6 months, for potential future analysis.
Comprehensive computer analysis of up to three employees per month.
Comprehensive computer analysis of more than three employees per month.
Upload collected data onto online review platform for search and analysis.
Staff training on computer security and protecting confidential information.
Cyber Essentials Accreditation.
Quarterly Cyber Security Audit.

Employee Investigations

 

 

Name *

Company *

Phone *

Email *

How did you hear about CYFOR?

Enquiry

captcha


Call CYFOR today on
0207 438 2045

or click here to contact us
and speak with a forensic specialist.

Sign Up to Our Newsletter

 

 

X

Request a call back

captcha

Don't show again