Computer Forensics

Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.

Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.

Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. It has been used in a number of high-profile cases and is becoming widely accepted as reliable within North America and European court systems.

Cell Phone Analysis

Corporation agencies have to seriously consider the role cell phones and mobile devices play in their organizational flow of data and proprietary information.

Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. The phrase mobile device usually refers to mobile phones; however, it can also relate to any digital device that has both internal memory and communication ability, including PDA devices, GPS devices and tablet computers.

The use of phones in crime was widely recognized for some years, but the forensic study of mobile devices is a relatively new field, dating from the early 2000s. A proliferation of phones (particularly smartphones) on the consumer market caused a demand for forensic examination of the devices, which could not be met by existing computer forensics techniques.

Mobile devices can be used to save several types of personal information such as contacts, photos, calendars and notes, SMS and MMS messages. Smartphones may additionally contain video, email, web browsing information, location information, and social networking messages and contacts.

Risk Management

RBS acts as a Risk Management advocate. We help draft compliance standards and perform audits to identify gaps in that compliance. We also deliver an organization’s mature risk posture through vulnerability management, information security incident response, end-user and IT training, and sponsor healthcare vendor security.

RBS serves as a trusted advisor during a suspected data security event. From educating client staff to legal documentation of data security breaches, RBS plays an integral part in limiting risk for healthcare organizations from all types Information Security Incidents. RBS conducts data breach education at all levels of an organization and helps triage security events, manage incidents, conduct forensics analysis, and play a client-advocacy roll and expert testimony when a compliance authority investigates a breach.

Our clients hold a vast amount of protected data and internal records; RBS holds the right tools and industry professionals to reinforce the barriers that surround that data as well as the business processes that create, manage, and utilize that data. If any organization has experienced a data breach or is interested in reducing the likelihood of a data breach, they do not need to look any further than our name: RBS.

© RBS COMPUTER FORENSICS 2016 | TEL:(905)220-5529 | Email: