Digital Forensics with Dedicated Professionals and State-of-the-Art Tools
DHG evaluates electronically stored information (ESI) from sources that include, but are not limited to laptops, desktops and servers; mobile phones and tablets; USB drives and SD cards; email accounts; and Facebook, Twitter, and web-based email.
We will provide you with more than just the ESI we recover. We will leverage our knowledge and experience and work with you to provide a complete investigation. We work with our firm’s Fraud & Corporate Investigations, Commercial Damages, Personal Economic Damages and Domestic Matters professionals to provide you a dynamic, unified investigations team, eliminating the need to engage and coordinate forensic and financial professionals from multiple firms
Deleted File Recovery & Analysis
"Deleted" does not always mean the data is gone. With our tools and experience, we can recover data that may not be visible to the user.
We have specialized tools for recovering file passwords, Windows passwords and cell phone passcodes.
Internet History Analysis
Computers, mobile phones and tablets retain a surprising amount of data on a user’s browsing history, even when using a private browsing mode.
Social Media Investigations
Courts are recognizing that screenshots of social media sites are not verifiable or repeatable. Using our tools, we can collect evidence from social media sites and other websites using a forensically sound process.
Attached Device Analysis
One of the most common ways to steal data from a company is to attach a USB drive and copy files to it. Attached device history along with recent file analysis can reveal whether data may have been removed from a company’s computers.
Indexing & Keyword Searching
Modern computers contain hundreds of thousands of files, and users may not always store evidence in the most obvious places. Using a variety of methods, we can search data efficiently and reveal relevant data.
We work with law firms to identify potential sources of electronically stored information (ESI) and collect ESI from a variety of sources.
Is relevant evidence found on the Internet? Our focused tools can help us find and preserve evidence for use in your case.
Incident Response & Breach Investigations
Our team is ready to respond when your network is compromised. Call our breach response hotline at 844.696.2488.
Whether you think someone is spying on your client or the subject of your investigation is blaming a virus, we can help uncover what really happened.
Network Security & Vulnerability Assessments
Network security is difficult for even seasoned IT professionals. Our experienced vulnerability assessment team can help ensure your network is secure.