If you believe your information system has been compromised, SCRT can bring its expertise in order to identify the affected components and entry points.
SCRTs analysis is based on the following key points:
- Preparation and interview
Our engineers use their eyperience in attack and malware analysis to analyse the data. This is always done while respecting procedures so that any results can be used in court.
If you are the victim of a theft or if illicit documents have been viewed from your network, SCRT can bring its expertise to help you gather proof of the incident.
© 2002-2017 SCRT. All rights reserved.