Bend — Don’t Break — When a Cyber Breach Occurs
Has your organization been breached? HORNE Cyber’s Digital Forensics & Incident Response services help your organization to bend – not break – when a breach occurs.
Cyber criminals and malicious insiders often leave behind digital evidence of their actions against organizations that can be recovered and investigated. HORNE Cyber’s elite team of digital forensics and incident response experts have assisted and trained local, state and federal law enforcement on investigating computer crime. Additionally, HORNE Cyber’s team is nationally recognized for extensive experience in reverse engineering and advanced penetration testing. HORNE Cyber’s digital forensics services can assist your organization in litigation support, data recovery, open source intelligence, digital forensic analysis of networks and data storage and mobile devices, and reverse engineering of malware. These services are critical in determining the effects a cybercrime has on your organization and its network.
Our diverse team of digital forensics & incident response experts can quickly identify, contain and remediate a cyberattack against your organization so that network functionality can be restored to minimize downtime, as well as subsequent attacks. Being nationally recognized for our extensive experience in reverse engineering and advanced penetration testing, the HORNE Cyber team can assist your organization in data recovery, and malicious software identification and remediation in the aftermath of a cyberattack. No matter the scale of your breach, HORNE Cyber’s elite team of digital forensics & incident response experts is prepared to assist in quickly and efficiently identifying, containing and remediating a cyberattack against your organization.
Leveraging experience in analysis of nation-state and organized crime malicious software ("malware") campaign tools, HORNE Cyber's team can perform reverse engineering and capability analysis of malware that has been identified on compromised systems. With this service, HORNE Cyber can determine the true impact of infection on an organization's systems and valuable intellectual property. Reverse engineering can also be performed on hardware, software, and protocols for which source code has been lost.
Litigation Support Services
Building on years of digital forensics experience, HORNE Cyber provides third party digital forensics reviews and full analysis services that can be used in both criminal and civil court matters. In legal proceedings, the HORNE Cyber team often provides expert witness testimony on digital forensics matters.
Open Source Intelligence (OSINT)
HORNE Cyber’s team of digital forensic experts identify digital information from various sources, such as the dark web, about an individual or corporation, including possible data leakage or personal information.
Host Based Forensics
Using experience with a wide range of file systems and operating systems, HORNE Cyber conducts digital forensic analysis of data storage devices such as desktops, laptops, and servers.
HORNE Cyber mitigates the risk of losing critical digital information while increasing your system’s IT security. In the case of a security breach or negative event, HORNE Cyber's digital forensics professionals assist in data recovery and investigation of material on digital devices. The HORNE Cyber team works with clients to restore and repair data and files that were compromised in the breach.
Mobile Device Forensics
With years of experience uncovering data on multiple types of digital devices, HORNE Cyber’s team performs digital forensic analysis of a wide range of mobile devices, such as smart phones, tablets, and GPS devices.
In the event of a breach or incident, HORNE Cyber provides digital forensic analysis of network traffic and logs to determine events that occurred on network connected devices to enable threat mitigation and recovery.
At the end of our investigation, we provide your organization a detailed report notifying you of the full of the incident, including:
- Affected applications, networks, systems, and user accounts
- Malicious software and exploited vulnerabilities
- Stolen information
All critical information will be detailed and documented in two actionable reports:
- Executive summary: Summarizes investigative process, major findings and containment/eradication activities.
- Technical report: Provides details of how the attack occurred with a list of affected computers, locations, user accounts and information. We will also make recommendations on containment and remediation.
- Law firms