Organizations must develop and implement a holistic risk-based IS audit strategy using industry standards, guidelines and best practices. This is important to ensure that IT and business systems are protected and controlled. In addition, it’s the responsibility of the ICT management to communicate emerging issues, potential risks, and audit results to key stakeholders.
At Cryptum Limited we have a qualified team of certified and experienced professionals who are well versed in modern Cyber security certification products available in the market today. We organize boot camps for corporate training & special cases for individuals who need hands on training.


What’s the need?
Just as crime scene investigators carefully gather physical evidence, forensics acquisition professionals methodically, safely, and securely acquire electronic evidence in a manner that preserves the data and maintains the chain of custody. Our forensic service obeys the highest standards of secure storage and evidence handling. Using current, best of breed technologies, our laboratory facilities allow for most types of digital media to be forensically examined and evidential data recovered. All material is handled and documented in accordance with the guidelines relating to digital evidence.
Our forensics lab is able to process most types of common media; from server and RAID forensic images to the smallest removable piece of smart media used in devices like smart phones, digital cameras, PDA`s and GPS systems.
The lab is equipped with highly efficient and secure hardware based forensic imaging tools that provide integrity of the forensic images and drastically cut down the time to image over traditional software based imaging methods.
The growth in network connectivity, complexity and activity, has been accompanied by an increase in the number of crimes committed within networks.
Security and network forensics is a critical requirement for many organisations to protect their information assets and investigate unwanted behaviour on their IT systems.
Our forensic investigation teams are made up of highly skilled engineers with a broad spectrum of skills, which also includes expert network penetration testers. Network investigations may include setting up network monitoring capabilities and the subsequent analysis of these traffic captures. Investigations may also include log event analysis from network devices, endpoint security devices and the correlation of these with traffic analysis to track and trace a possible or actual network compromise.

Why perform network forensics and digital investigations?

  •  To identify network intrusions.
  •  Respond to network breaches.
  •  Detect data leakage and determine its scope.
  •  Record and analyse raw network activity.
  •  Implement a continuous network monitoring solution.
  •  Identify and authenticate specific network user activities.
  •  Create custom data mining solutions with document authentication.
  •  Formulate and fulfil incident response plans to a breach.

In the event of a breach, theft, or inappropriate behaviour, it is absolutely crucial that electronic evidence be preserved. Electronic evidence contains the information needed to understand three things:

  •   How the events happened.
  •   How to mitigate the cause of the events.
  •   What data or resources may have been affected by the breach or theft?

It is essential that electronic evidence be acquired in a methodical, safe, and secure manner, and preserved in a manner that is admissible in a court of law. Cryptum limited is oblivious of this fact and has skilled workforce to roll out the same.


1 comment

Gina Henrie Nov 17, 2016

I did not realize that forensic acquisition professionals methodically and securely acquire electronic evidence like investigators gather physical evidence. My sister was telling me about them the other day, but I did not know until reading this that that is what they did. It would be neat to watch these people at work and see what kind of evidences they find. I think it would be a fascinating thing!




Powered by JEMSLAB

University of Nairobi