Please click the 'Jobs' button to see all current opportunities
Please click the 'Jobs' button to see all current opportunities

Digital Forensics

Digital devices have become a part of everyday life and digital evidence is becoming increasingly common in the prosecution and defence of serious crime. Offenders such as terrorists, drug dealers and child abusers are becoming increasingly reliant on computers, phones and social networks to communicate and organize themselves. While the digital traces are helpful, it also means a huge amount of time can be spent sifting through data.
Our digital forensics services include:

  • IT Security and Vulnerability laboratory based digital forensics services
  • Network & server digital forensics services
  • E-Discovery collection & investigations
  • Cyber Incident Response (CIR)
  • Digital forensics expert witness provision for prosecution & defence
  • Digital forensics services litigation support
  • Digital forensics data recovery

CAATS / Data Analysis

Computer assisted audit techniques (CAATs) refer to the use of technology to help you evaluate controls by extracting and examining relevant data. Sophisticated use of CAATs can be known as ‘data analytics’ and is increasingly being used across the profession. Data...

Vulnerability Assessment

This is the process of identifying vulnerabilities in the computer systems, networks, and the communication channels through techniques such as ethical hacking. It is performed as a part of auditing and also to defend the systems from further attacks. The...

Penetration Testing

Penetration testing can help to identify vulnerabilities or flaws in your network, but you may still be wondering if you need it for your business. Some IT Security and Vulnerabilitys primary security assessment services include:

IT Supplier Management

The supplier base of organizations for IT services is increasing – this is a consequence of a myriad of factors like increasingly globalized business processes that provide access to global suppliers, increasing the complexity of supply chains, increase in the scale...

IT Audit

IT Audit helps to highlight: To what extent the information support provided to your company’s key business processes is full and efficient. The possibility and benefits of applying new technologies and approaches of the modern digital world (such as business...

PCI / DSS

Digital devices have become a part of everyday life and digital evidence is becoming increasingly common in the prosecution and defence of serious crime. Offenders such as terrorists, drug dealers and child abusers are becoming increasingly reliant on computers,...

Cyber Essentials

Cyber Essentials can help your organisation in many ways: Reassure customers that you take cyber security seriously.Be listed on our Directory of organisations awarded Cyber Essentials.Attract new business with the assurance that you have cyber security measures in...

Staff Recruitment

Our recruitment team has considerable experience in sourcing and recruitment of IT professionals. They are core IT experts which provides them edge over other recruiters. 

Data Privacy / Compliance Audit / Training

Data Privacy is today considered an essential part of supporting the digital economy and is increasingly receiving high levels of media attention, primarily or the wrong reasons. Data Privacy requires the correct level of expertise and experience and it is widely...

Industrial Control Systems

Today, widely available software applications and internet-enabled devices have been integrated into most ICS, delivering many benefits, but also increasing system vulnerability. Sophisticated malware that specifically targets weaknesses in ICS is on the rise, posing...