A little knowledge can be a dangerous thing…

In today’s world, everything moves so fast. Everyone wants something yesterday. Everyone demands and expects more from less. Every action we take leaves a data footprint and every product we…

Security Center of Excellence profile picture

Security Center of Excellence

October 12, 20203 minutes read

In today’s world, everything moves so fast. Everyone wants something yesterday. Everyone demands and expects more from lessEvery action we take leaves a data footprint and every product we buy asks for a review.  

So why are today’s forensicators not taking the time to properly review data on cases? Can we really afford to take shortcuts when people’s jobs, careers, marriages, livelihoods – even their lives – are on the line? 

We have all heard of – or experienced – situations when work colleagues overstep the mark. Office pranks, off-the-cuff comments on email, even hiding office chairs or moving cars when colleagues aren’t looking because it’s “funny”. 

But what happens when those pranks go wrong, or when there is malice in those pranks? When someone sends a malicious email with intent and it gets someone fired? Or when someone steals IP or PII using another colleagues workstation to hide their own malfeasance? What happens when they do this to bring about their own agenda?  

Using just a high-level forensic tool to collect only live files and easily accessible evidence could result in not seeing the real story behind the “facts”. This information may be used to discipline – or even prosecute – an individual. Could you sleep at night knowing you’d got someone fired, or arrested, or worse as a result of incomplete or inaccurate information? 

How would you feel if someone later demonstrated that there was no way Employee A could have committed the action that lost them their job – or their marriage – or their family? Were the time and effort saved by using an artifact-led approach worth the investment? Did you get a good ROI? 

Let’s take another example where an employee is fired after inappropriate images are found on his computer. You investigate, prove the images were there and they get sacked. End of, right?

But what if an investigation with a deep-dive forensic tool could have surfaced deleted files – containing child sexual abuse material (“CSAM”). That evidence could lead to a conviction and help protect further children. If something had happened after the fact, could you stand by your decision to use an artifact-led approach to your investigation? 

How comfortable would you be taking your findings to court if you know you only have half the information availableAnd worse – you don’t really know which half.  All it takes is a canny defense attorney with access to a deepdive tool that has surfaced, say, 50,000 more files to call the prosecutor’s evidence into question 

How can you stand by your evidence if you don’t have all the information? The evidence presented by a forensic examiner has the potential to exonerate or convict an individual. It has the power to save or to ruin lives.  

So, ask yourself: Do you know enough?” If the answer is no, it doesn’t matter how easy your tool of choice is to use  

See how OpenText can help. 

Authored by Iain Nash, Account Executive, OpenText, and James Allen Kritselis, Lead Solutions Consultant, OpenText

Share this post

Share this post to x. Share to linkedin. Mail to
Security Center of Excellence avatar image

Security Center of Excellence

See all posts

More from the author

Threat alerts

Threat alerts

December 2021 December 14, 2021: Log4j Summary: Top US cybersecurity officials have warned of the zero-day vulnerability found in the Java logging library Apache Log4j….

June 3, 2021 1 minute read
Lessons from the SolarWinds attack: How to protect your business

Lessons from the SolarWinds attack: How to protect your business

By the time it was discovered in December, the SolarWinds cyber attack had evaded the security defenses of and penetrated at least 18,000 government agencies,…

March 25, 2021 5 minutes read
The HAFNIUM Attack on the on-premises Microsoft Exchange Server

The HAFNIUM Attack on the on-premises Microsoft Exchange Server

On March 2, Microsoft announced that its on-premises Exchange Server had experienced multiple 0-day exploits. Microsoft commented: “In the attacks observed, the threat actor used…

March 18, 2021 3 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.