Using the right tools for digital examinations

Have you ever been sent looking for something, but it wasn’t where it was supposed to be? We’ve all been there. Wallet, car-keys, children’s schoolbooks! Irritating, sure. A…

Security Center of Excellence profile picture

Security Center of Excellence

October 12, 20202 minutes read

Have you ever been sent looking for something, but it wasn’t where it was supposed to be? We’ve all been there. Wallet, car-keys, children’s schoolbooks! Irritating, sure. A waste of time, definitely. But not the end of the world, right! 

But what if what you’re looking for is a key piece of digital evidence in a criminal prosecution? Or a vital document in a competition or M&A investigation? You’re given a drive, or endpoint location and asked to find the needle in the haystack. So, where do you begin? And how do you prevent a minor irritation from becoming something far more serious? 

Today’s digital environments are complex and massive. They can hold terabytes of information including files, contacts, documents, and imagesto emails, social media, and user-generated content. They also contain the fragments left behind when someone knows they are being investigated and are trying to stay one step ahead.  

This digital evidence can be vital to an internal investigation or legal case your company needs to defend itself in.  

In 2016, IBM found that 60% of all cyber-attacks were carried out by insidersThe Council of Economic Advisors determined that malicious cyber activity cost the U.S. economy between $57 billion and $109 billion in 2016. People conducting malicious activity internally will try to hide their tracks, but you can find evidence of their behavior with the right tools.  

Providing the right information by having a forensically repeatable process and by being able to locate the specific evidence allows you to identify and collect what you need without introducing superfluous information, saving time, and storage of data. 

Losing something under a sofa doesn’t typically come with a substantial financial loss. Losing intellectual property at the hand of a disgruntled employee, or losing a contract dispute with a competitor, can run into millions in lost time, profits, and ancillary damages.  

The bottom line, if you can’t find what you’re looking for or if it’s not in the right place, you need proper investigative tools that ensure you have a repeatable, defensible process that will stand up in a court of law. 

See how OpenText can help. 

Authored by Scott Saldinger, Sr. Account Executive, OpenText and Mike Stone, Sr. Account Executive, OpenText.

Share this post

Share this post to x. Share to linkedin. Mail to
Security Center of Excellence avatar image

Security Center of Excellence

See all posts

More from the author

Threat alerts

Threat alerts

December 2021 December 14, 2021: Log4j Summary: Top US cybersecurity officials have warned of the zero-day vulnerability found in the Java logging library Apache Log4j….

June 3, 2021 1 minute read
Lessons from the SolarWinds attack: How to protect your business

Lessons from the SolarWinds attack: How to protect your business

By the time it was discovered in December, the SolarWinds cyber attack had evaded the security defenses of and penetrated at least 18,000 government agencies,…

March 25, 2021 5 minutes read
The HAFNIUM Attack on the on-premises Microsoft Exchange Server

The HAFNIUM Attack on the on-premises Microsoft Exchange Server

On March 2, Microsoft announced that its on-premises Exchange Server had experienced multiple 0-day exploits. Microsoft commented: “In the attacks observed, the threat actor used…

March 18, 2021 3 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.