Digital Forensics
The Information Technology (IT) infrastructure is the life blood of all business operations and communications. Protecting information and solving computer-related issues are critical to the integrity of every business.
A host of digital forensic and IT-related services are available to meet client needs in any number of situations. Additional details can be found within our brochure: Digital Forensic Services
Click each link below for more information
Digital Forensics
In today's world, there is no facet of daily life that does not involve electronic information systems. INA offers complete investigative and forensic services for electronic data systems and has built a state-of-the-art digital forensic laboratory for this purpose. We use industry approved protocols for the collection, preservation, examination and preservation of electronic data, including maintaining the legal chain of evidence.
Specialized techniques are used to examine and analyze the electronically stored data in order to present findings and conclusions. Electronic data can be recovered from computers, digital cameras, digital multimedia players, flash drives, mobile phones, tablet devices, and video-recording systems. There are many items that can be discovered during a digital forensic examination, including:
- Deleted Data
- Email or Instant Messenger Correspondence
- Encrypted or Password-Protected Files
- Hardware or Data Manipulation
- System usage / File Access Timestamps
- Web Browsing History
Additionally, INA can provide data recovery services for computers and other electronic devices that have been damaged due to unintentional or malicious action.
Return to List
IT Security Assessments
INA conducts IT Security Assessment Surveys to determine vulnerability and exposure to being compromised. Our objective is to demystify IT infrastructure and make it understandable for executive management.
Return to List
IT Security Policies
INA customizes IT security policy usage for its clients in all areas, including:
- Incident Response
- Internet Acceptable Use
- Mobile Computing
- Monitoring and Audit Policy
- Network Usage
- Password
- Remote Access
- Storage
- Wireless
Return to List
IT Service Support
INA maintains a staff of qualified IT technicians who can replace or assume a transition role when a key employee has been terminated. Our training and focus is to ensure the security and integrity of the client's network.
Return to List
Contact us today to learn more about INA’s Digital Forensics.
- Intelligence-Based Risk Management
- Investigations
- Digital Forensics
- Corporate Compliance
- Security Services
Request a Speaker
Recent Site Updates
INA Security Matters
From Pies in the Face to Kidnapping, Executives Face Numerous Threats
Security Awareness: INA Helps Protect Students
Analysis of the Lincoln Assassination; Intelligence Analysis is Worth 100,000 Words
Your stuff is spying on you. Here’s what you can do about it
Security expert shares advice on staying safe after recent violence