The acquisition of Electronically Stored Information from a multitude of modern devices such as computers, laptops, tablets, smartphones, storage devices, GPS’, digital cameras etc. is but only one aspect of digital forensics.

Digital forensics requires the combination of computer science, integrity of evidence and investigative process that is applied to establish fact and determine the outcome of a judicial process.

Secur has the skill and experience needed to successfully conduct every step of the scientific process that is Digital Forensic Investigation.

New FBI digital forensic lab opens in North Texas

Our team is qualified and equipped to

  • acquire digital evidence in a forensically sound manner from mobile devices, computer systems and networks;
  • analyse that evidence and correlate it to other information gathered by means of interviews, affidavits, crime scene management, log analyses, footage review;
  • Present the findings of the analysis of the evidence in the form of reports, statements and expert witness testimony.

These steps of a digital forensic investigation are undertaken against local and international standards of accepted forensic practice, have been tested and have stood up to various judicial enquiries.

By its very nature, forensics is a knee-jerk reaction to an incident that has occurred. Secur is in a unique position that sees us combine our expertise from Fraud Risk Management, Digital Forensics, and Information Security with market-leading tools that result in solutions that enable Secur to provide Pro-Active as well as Re-Active forensic and overall professional services to our customers.

Digital Forensics

Computer Forensics

What we refer to as Digital Forensics. We have a full lab facility including best of breed software such as Magnet Axiom to ensure that we deliver time after time with the most presentable, user friendly results to our lab processes.

Cellular Phone Analysis

The knowledge that critical evidence exists and rests within a handset is a cause of frustration if one cannot access it in a forensically sound manner.

Cellular Phone Debugging

In most spyware or malware cases, you will not notice your device is infected because it will be operating silently in the background, is barely noticeable and can disguise itself as an authentic application.

Certified Fraud Examiner Services

Looking for a CFE in South Africa to conduct digital fraud investigations? We offer digital forensics services that can strengthen and protect your organisation.

Cyber Investigations

Business hubs such as Cape Town, Pretoria and Johannesburg are awash with crime syndicates who have perfected the art of identity theft and online fraud. All Cyber Crime Investigations including Business Email Compromise, extortion, Invoice scams and fraud are welcome.

Cyber Penetration Testing

Within the realm of network and online security it is often necessary to conduct penetration tests in a controlled manner to highlight network vulnerabilities.

Device Acquisition

When there is suspicion of fraud or malfeasance, it is often prudent to acquire a forensically sound image of a drive as a matter of urgency.

Due Diligence Investigations

With rising levels of fraud, tender rigging, fronting and other commercial crimes in South Africa, it is imperative that a due diligence is conducted.

Hacking Recovery

Hacking is a reality of online connectivity. In a marketplace where businesses are heavily dependent on online access to data as well as services to conduct business.

Hard Disk Drive Analysis

Data recovery and hard disk drive analysis have always been seen as two separate skillsets within the IT industry. Not anymore!

Image Enhancement

Our forensics team are able to provide static image enhancement as well as digital video enhancements. Please bear in mind that results depend on the quality of the original image.

Incident Response Team

Our IRT is able to deploy to your site quickly based on your incident response plan or we will work with you to create a plan based on your specific requirements.