What is Digital Forensics

17 May 2016

What is Digital Forensics

What is Forensic Acquisition and Recovery and why do we need it?

In the event of a cybersecurity investigation, a vital part of the response process is represented by data acquisition and recovery to support comprehensive forensic analysis.

As soon as we agree on a brief for a forensic investigation with the customer, PGI deploys one of our teams of forensics specialists on-site to conduct data acquisition, creating a forensic copy of your digital media and the data held on it. The forensic evidence is safely copied, transported and stored in a secure environment, whereby digital forensic analysis can then begin.

At PGI, we use our in-depth knowledge and advanced equipment to carry out fast, effective and highly efficient data imaging and acquisition methods to protect an organisation from both present and potential threat actors and can identify potential malware. We ensure that only the necessary data is acquired and work with the customer to understand that threats are understood and potential risks are mitigated during and after the investigation process.

How does PGI carry out Digital Forensics?

PGI performs Digital Forensics, the process of investigating the actions performed on a digital system after collecting data through forensic data acquisition. Once data acquisition has been completed, we reconstruct user actions and system events that can help us identify artefacts such as the introduction or existence of malware, storing or distributing of files or malicious communication.

PGI has digital forensics expertise backgrounds from law enforcement, intelligence and defence sectors and have provided this service for our customers to support various types of investigations, such as:

Share this article


Your free global geopolitical
risk dashboard

PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.

The Risk Portal gives users up-to-date information and analysis on global affairs.

The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.

Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.

Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.

Visit the Risk Portal

Subscribe to our Cyber Bytes Newsletter

Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.

Get in touch today

For more information on how we can help you or your business, please contact us via:

Related News

CISMP, CISSP and CISM - what's in an acronym?

20 Mar 2017

There is a wide range of different security courses available, and a mind-boggling array of certific...

Read news article

International Womens Day - Pioneering Women in Tec...

08 Mar 2017

Pioneering Women in Technology – Katherine JohnsonThe Oscar season has been and gone. The...

Read news article

Law Firms and why they need cyber security

06 Mar 2017

Suffering a data breach can be devastating for any company but for law firms the impacts can be part...

Read news article
Back to the News Hub

Follow us

+44 (0)207 887 2699
©2017 PGI - Protection Group International Ltd. All rights reserved.
PGI - Protection Group International Ltd is registered in England & Wales, reg. no. 07967865
Registered address: Cascades 1, 1190 Park Avenue, Aztec W, Almondsbury, Bristol BS32 4FP