OUR SKILLS
Digital Investigations

We help you to meet requirements, take an investigative approach, run proactive discovery into data and information.

Crucially, we want to find the people behind these traces. We believe that data is only as good as the person behind manipulating it; therefore, we want to understand how this information is used against you. This is when we discover the data that was taken from you and the countermeasures we can take against it.

Computer forensics investigations help you to identify where data might have been accessed, where it could be sent to and how all of this could have happened. Our investigative approach and specialised team will help you to run proactive discovery into data and information.
Crucially, we want to find the people behind these traces. We believe that data is only as good as the person behind manipulating it; therefore, we want to understand how this information is used against you and the countermeasures we can take against it.

As the cloud infrastructure becomes more robust, many are now tempted to store information in the cloud. Some could be innocuous, such as photos of family and friends; others could be sensitive financial information relating to the operations of a company. Our team can help to identify data repositories in the cloud which are held by you or your organisation, we will use the appropriate techniques to collecr data off the cloud to enhance the effectiveness of your investigation or matter.

Crucially, we want to find the people behind these traces. We believe that data is only as good as the person behind manipulating it; therefore, we want to understand how this information is used against you and the countermeasures we can take against it.

With the prevalence of mobile phones in our corporate environments and the increase of remote working, information is now stored more than ever in our mobile phones. Together with the ever improving cameras and data storage sizes, our mobile phones now form a huge asset in terms of storing, accessing and taking images and documents. Our services can assist in identifying crucial information which may be stored in this mobile device.

Crucially, we want to find the people behind these traces. We believe that data is only as good as the person behind manipulating it; therefore, we want to understand how this information is used against you and the countermeasures we can take against it.

Data loss is an issue which everyone sees as a remote once in a blue moon event. Yet we constantly hear occurences of data losses in our everyday discussions. Many organisations have put in place different features and solutions designed to combat the inevitable data loss. We understand the implications a data loss event coutl have on you and your organisation and we seek to assist with our capabilities to recover any data which may still be remnant.

OUR SKILLS
Incident Response

With our technical team, our objective is to seal off your walls and find the mice hiding in the hole somewhere.

We want to take you out of the “kill chain” and establish the root cause of your troubles. We exist so you do not have to deal with technical jargon such as “remote execution shellcode”, “SQL injection”, “privilege escalation and lateral movement”.

Dealing with Ransomware? Unwanted remote access trojans? We see scores of attacker groups seeking financial gain by targeting companies with persistent threats to their networks and systems. Unfortunately, due to the rise in sophistication of attacker techniques, it is simply not enough to rely on traditional antivirus software to protect our systems anymore. We can assist to uncover traces in the systems, detect root cause and ultimately bridge the gap towards a better secured environment.

With the voluminous amoutns of emails organisations send and receive, it is very difficult to identify and review key pieces of conversation which may be crucial to an ongoing internal investigation, or to respond to any regulatory enquiries. Our solutions and platforms allow us to thread conversations and analyse infomation necessary for you to conduct an efficient email analysis.

The activities and behaviours of a disgruntled employee can sometimes pose more harm than any external attacker can, because of the familarity and understanding of the organisation.

Malware can hide, but it must run” is an adage commonly used in incident response scenarios. Trends for different types of malware can go up and down, and new malware is launched ever so frequently. However, when dealing with known or unknown malware, it is important to.

OUR SKILLS
Incident Response

With our technical team, our objective is to seal off your walls and find the mice hiding in the hole somewhere.

We want to take you out of the “kill chain” and establish the root cause of your troubles. We exist so you do not have to deal with technical jargon such as “remote execution shellcode”, “SQL injection”, “privilege escalation and lateral movement”.

Dealing with Ransomware? Unwanted remote access trojans? We see scores of attacker groups seeking financial gain by targeting companies with persistent threats to their networks and systems. Unfortunately, due to the rise in sophistication of attacker techniques, it is simply not enough to rely on traditional antivirus software to protect our systems anymore. We can assist to uncover traces in the systems, detect root cause and ultimately bridge the gap towards a better secured environment.

With the voluminous amoutns of emails organisations send and receive, it is very difficult to identify and review key pieces of conversation which may be crucial to an ongoing internal investigation, or to respond to any regulatory enquiries. Our solutions and platforms allow us to thread conversations and analyse infomation necessary for you to conduct an efficient email analysis.

The activities and behaviours of a disgruntled employee can sometimes pose more harm than any external attacker can, because of the familarity and understanding of the organisation.

Malware can hide, but it must run” is an adage commonly used in incident response scenarios. Trends for different types of malware can go up and down, and new malware is launched ever so frequently. However, when dealing with known or unknown malware, it is important to.

OUR SKILLS
E-Discovery & Litigation Support

A multitude of review platform solutions with varying features are available and our consultants will gladly introduce you to the one that best suits your needs.

With Mycroft, legal professionals can focus their time and efforts to secure the key judgement and ruling, we act as your support crew, handling the voluminous datasets frequently encountered in our increasing digital environments.

When you say how should we deal with terabytes of documents, we say let us take care of it and give you only what you need.

Partnering with Zylab, we provide a best in class solution to assist you with your eDiscovery and review needs. ZyLAB ONE eDiscovery uses Artificial Intelligence and Data Science tools to facilitate fact-finding missions through large or small electronic datasets related to the business-critical projects of governmental agencies, law firms, and companies of any size.
ZyLAB is recognized as “leader” in Gartner’s latest Magic Quadrant for eDiscovery Software. It is also ranked #1 for complete EDRM eDiscovery in the analysts’ most recent “Critical Capabilities for E-Discovery Software” report.

Our team of experienced professionals have been involved in many types of civil cases to assist with cases where court apperances as expert witnesses are required.

OUR SKILLS
Service Contacts / Agreements

Mycroft offers ad-hoc (short-term) forensic support as well as long-term support.

We understand the nature of these investigations can be very flexible and ad-hoc in nature. Likewise, we aim to provide services to suit your needs best. If you require a formalised contract with a standard package of hours and call time, we are more than happy to work with you to determine the best formula for your needs.

OUR SKILLS
Service Contacts / Agreements

Mycroft offers ad-hoc (short-term) forensic support as well as long-term support.

We understand the nature of these investigations can be very flexible and ad-hoc in nature. Likewise, we aim to provide services to suit your needs best. If you require a formalised contract with a standard package of hours and call time, we are more than happy to work with you to determine the best formula for your needs.

OUR SKILLS
Other Services

We can help your organisation to reduce exposure to potential cyber-attacks and insider threats, as well as prioritise and focus precious resources on the appropriate defences.
Working closely with your organisation, our experienced consultants can implement a cyber risk management strategy that helps to identify and assess potential threats (surface, vectors, and actors) applicable to your organisation, and develop a cost-effective risk treatment plan.

We have the expertise to conduct investigations into digital frauds and cyber incidents, perform malware analyses and digital forensics, as well as provide eDiscovery litigation support.
We can also be engaged on a retainer basis, and our experienced consultants will assimilate into or enhance upon your existing processes so that your organisation can respond decisively in times of crisis or need.

We can supplement and support your organisation in cybersecurity and IT processes, improving operational effectiveness and reducing overall costs.
We have the expertise for cybersecurity awareness programs, anti-phishing programs, IT assets management, and web management.

We conducts regular cybersecurity awareness training programs, as well as provide insights into cybersecurity-related guidelines released by various local and overseas institutions.
All our training programs are customised to the specific needs of the organisation and delivered by experienced consultants.


Are you involved in a role of cyber security or information technology forensics where you need to be kept updated on the latest trends and practices?

That’s why Mycroft exists.