blackthorn information security

Services

 

 Our professionalism, responsiveness, and the quality of our work is the foundation for providing the highest level of information security services you can find.

four phases of a forensic investigation

 

01. Identification

A key step of any investigation involves the identification of potential evidence in a cyber crime. 

02. Preservation

Detailed information must be recorded and preserved, including all hardware and software specifications, as well as systems being investigated and being used in the investigation.

03. Examination

Investigators examine all data from identified potential evidence, using a variety of methods and approaches to do a thorough analysis.

04. Presentation

Once the data has been accurately identified, preserved and examined it can then be presented as evidence in a court of law.

01. Identification

A key step of any investigation involves the identification of potential evidence in a cyber crime. 

02. Preservation

Detailed information must be recorded and preserved, including all hardware and software specifications, as well as systems being investigated and being used in the investigation.

03. Examination

Investigators examine all data from identified potential evidence, using a variety of methods and approaches to do a thorough analysis.

04. Presentation

Once the data has been accurately identified, preserved and examined it can then be presented as evidence in a court of law.

Proven Success

Digital Forensics

Digital ForensicsThe purpose of digital forensics is to maintain the integrity of evidence by properly identifying, preserving, analyzing, and presenting electronically stored information using court-accepted methodologies and procedures to maintain legal standards. While used most often on personal computers, digital forensics may be performed on almost any device containing electronic data such as computers, storage media such as thumb drives and CD-ROMs, game consoles, digital cameras, medical equipment, security systems, or scanners and copiers.

Blackthorn Information Security has built a solid reputation of providing exceptional digital forensic services with proven results.

Proven Success

Mobile Device Phone Forensics

Mobile Device Phone ForensicsCell phones and smartphones – the most prevalent form of communication available today- can contain call histories, movies, text messages, photos, contact lists, email, and other crutial information. Increasingly, large amounts of data are also other mobile devices such as pads and MP3 music players. Depending on the type and brand of mobile device, Blackthorn Information Security can recover live data from photos to text messages to movies, as well as recovering deleted data.

We have performed cell phone forensics in both civil and criminal cases and have extensive experience in this new area of forensics as well as the latest cell phone tools such as Access Data’s Mobile Examiner Plus and the Cellebrite UFED Physical Analyzer.

Proven Success

Electronic Evidence Discovery (E-Discovery)

Electronic DiscoveryElectronic evidence discovery (also known as Electronic Discovery or E-Discovery) collection gives attorneys the winning edge by identifying, locating, preserving and analyzing relevant evidence from electronic media to help you prove your case. Litigation support includes implementing litigation holds to preserve relevant records, deduplication, removal of non-responsive data, records management, and document review.

Whether you need to meet discovery demands or are attempting to secure and centralize your business records for compliance or future litigation demands, our e-discovery services will make your job easier.

Proven Success

Vulnerability Assessments & Penetration Testing

Vulnerability Assessments & Penetration TestingIt’s a scary world out there. Ensuring that your IT architecture is up to today’s standards for security can be an intimidating challenge. From malicious hackers to foreign competitors to political extremists, it’s hard to tell where the next attack on your networks and databases will be coming from, or how those attacks will confront you. Blackthorn Information Security can help you determine where your risk and vulnerabilties lie, and how to best maintain a properly hardened network that will stand up to today’s challenges of an interconnected world.

Proven Success

Incident Response

Incident ResponseInformation security isn’t only about your information out of the hands of the bad guys. It also means keeping it that same information accessable to the right people when it’s needed. Because our team understand IT issues as well as security, we see data security and data availability as both sides of the same coin.

When you have an incident involving a hacking attempt, theft of intellectual property, or other “cyber problem” involving your data, time is not on your side. Especially in these days of increased reporting requirements such as HIPAA, SOX, or state data breach reporting acts. Blackthorn’s experts can get in fast, analyze your problem, and deliver a fix that will work for you. As one of our client’s recently put it: “You guys are like the SWAT Team!”

Get In Touch

Name*
This field is for validation purposes and should be left unchanged.

Burlington Office
P.O. Box 64784
Burlington, VT 05406
Tel: 802-373-0322