Digital Forensics with Dedicated Professionals and State-of-the-Art Tools

DHG evaluates electronically stored information (ESI) from sources that include, but are not limited to laptops, desktops and servers; mobile phones and tablets; USB drives and SD cards; email accounts; and Facebook, Twitter, and web-based email.

We will provide you with more than just the ESI we recover. We will leverage our knowledge and experience and work with you to provide a complete investigation. We work with our firm’s Fraud & Corporate Investigations, Commercial Damages, Personal Economic Damages and Domestic Matters professionals to provide you a dynamic, unified investigations team, eliminating the need to engage and coordinate forensic and financial professionals from multiple firms

Highlighted Services

Deleted File Recovery & Analysis

"Deleted" does not always mean the data is gone. With our tools and experience, we can recover data that may not be visible to the user.

Password Recovery

We have specialized tools for recovering file passwords, Windows passwords and cell phone passcodes.

Internet History Analysis

Computers, mobile phones and tablets retain a surprising amount of data on a user’s browsing history, even when using a private browsing mode.

Social Media Investigations

Courts are recognizing that screenshots of social media sites are not verifiable or repeatable. Using our tools, we can collect evidence from social media sites and other websites using a forensically sound process.

Attached Device Analysis

One of the most common ways to steal data from a company is to attach a USB drive and copy files to it. Attached device history along with recent file analysis can reveal whether data may have been removed from a company’s computers.

Indexing & Keyword Searching

Modern computers contain hundreds of thousands of files, and users may not always store evidence in the most obvious places. Using a variety of methods, we can search data efficiently and reveal relevant data.

eDiscovery Consulting

We work with law firms to identify potential sources of electronically stored information (ESI) and collect ESI from a variety of sources.

Internet Investigations

Is relevant evidence found on the Internet? Our focused tools can help us find and preserve evidence for use in your case.

Incident Response & Breach Investigations

Our team is ready to respond when your network is compromised. Call our breach response hotline at 844.696.2488.

Malware Analysis

Whether you think someone is spying on your client or the subject of your investigation is blaming a virus, we can help uncover what really happened.

Network Security & Vulnerability Assessments

Network security is difficult for even seasoned IT professionals. Our experienced vulnerability assessment team can help ensure your network is secure.

 

Publications Publications
IT_Advisory.jpg
Managing Cybersecurity Risk – The Anytime, Anywhere ...
Cybersecurity: Mobile devices, social media, email platforms and the cloud are but a few examples of emerging technologies altering the ways organizations
Read More
IT_Advisory.jpg
Data Held Hostage
ON JUNE 2, 2014, the United States Department of Justice announced that a covert public-private initiative dubbed “Operation Tovar” had disrupted criminal
Read More
IT_Advisory.jpg
Preparing Your Organization for Denial Service Cyber...
A recent string of cyber-attacks against some of the world's largest banks and financial institutions have grabbed national headlines and raised concern
Read More
178
1
News News
No Items.
178
0
Alerts Alerts
No Items.
178
0
Events Events
No Items.
178
0
Blog Blog
No Items.
178
0
Case Studies Case Studies
No Items.
178
0
DHG TV DHG TV
No Items.
178
0
Name/Title Office vCard Email

Integrated Team Approach for One-Stop Shop Investigations

DHG’s Digital and Computer Forensics team will provide more than just the electronically stored information (ESI) we recover.  We will leverage our knowledge and experience working with you to provide a complete investigation.  We collaborate with our firms’ forensic accounting, commercial damages, personal injury, and domestic professionals to provide you a dynamic, unified investigations team, eliminating the need to engage and coordinate forensic and financial professionals from multiple firms.

Our team evaluates electronically stored information (ESI) from sources that include, but are not limited to:

  • Laptops, desktops, and servers
  • Mobile phones and tablets
  • USB drives and SD cards
  • Email accounts
  • Facebook, Twitter, and web-based email

Our Team’s Certifications Include:

  • EnCase Certified Examiner (EnCE)
  • AccessData Certified Examiner (ACE)
  • Certified Information Systems Security Professional (CISSP)
  • Certified Fraud Examiner (CFE)
  • GIAC Certified Incident Handler (GCIH)
  • Certified Computer Examiner (CCE)
  • GIAC Certified Forensic Examiner (GCFE)