Thursday, 13 December 2018

What is the Difference Between Digital Forensics and Information Security

Before we get into the differences between digital forensics and information security, let’s stop and take a look at how they are alike.

Image result for digital forensics

Both digital forensics and information security are aimed at protecting your digital data, goods and valuables as well as digital resources. People who are involved in digital forensics or information security can work in a range of industries, including private businesses and organisations. Why can people in the digital forensics and information security work in so many different industries? Because, companies know that as the world becomes more digitally dependant so does the need to keep their technology and systems properly secured. Digital forensics and information security specialists are becoming more and more popular as the demand for their skillset grows.

But, just because digital forensics and information security are both focused on digital goods and resources doesn’t mean the two are both closely associated with each other doesn’t mean they are the same.

It is best to think of digital forensics and information security as two different sides of the same thing, so the services and work that is done is very much the same, but it does have differences.

So what is the difference between digital forensics and information security? To put it into simple terms that everyone can understand, information security is about preventing and protecting against online and digital threats. On the other hand digital forensics is about the response that comes after.

Related image

Let’s look at it like this – information security is the team that executes and supports the information security system with the aim being to protect individuals and businesses against cyber threats. If information security fails to protect the users and the systems are broken, then this is where the digital forensics experts come into the picture – they will put their skills to use by singling out the threat, understanding it and trying to recover all the data that was lost and/or stolen.

At TCG Digital Forensics, we offer all our clients clean, professional and affordable digital forensics services as well as information security – all supplied by our team of skilled digital forensics experts. Do not hesitate to contact us to discuss your requirements; simply give us a call on 021 110 0422 or email

Tuesday, 11 December 2018

3 Reasons why you should always update WhatsApp

In this digital age, time is important, so most people want to satisfy most of their needs in just one click… More and more messengers are becoming popular, but WhatsApp still remains especially popular, which is why hackers keep their sights on it.

Image result for whatsapp

Here are some of the vulnerabilities in the WhatsApp application…

> Did you know that it is possible to gain access to an individual’s messages because of vulnerability in the WhatsApp protocol?

> Hackers can a gain access to a user’s cell phone by using a vulnerability that is triggered when a video call is answered.

> There is vulnerability with the two-factor authentication on WhatsApp. If a user switches off their phone at night, the password recovery system can be made to call and name the code, this code can be accessed using voicemail since most passwords are still weak.

To avoid becoming the next victim, always keep your WhatsApp updated! Has your phone been hacked? Please contact us immediately at TCG Digital Forensics in Cape Town and Centurion – give us a call on 021 110 0422 or email

Friday, 7 December 2018

Cellular Forensics and Radar Analysis help find Plane Crash Site in Record Time!

Did you know that involving experts in the cell phone and radar analysis fields can not only save time in finding a crash site, but also save lives! By using cellular forensics and radar analysis, the search area is made smaller and urgent matters, such as saving the lives of those who were involved in the crash, can be resolved.

On the 19th of November 2019 in North Dakota, a Medevac plane was reported missing. By using the power of cellular forensics as well as radar analysis, the Civil Air Patrol’s National Radar Analysis Team and the National Cell Phone Forensics played a massive part in saving the day. These two teams were able to aid the rescue team in finding the terrible plane crash site.

So how did the two teams manage to identify the precise spot where the plane went down? Well, using cellular data forensics and partnering with the power or radar data forensics, they prepared a detailed map showing where the plane crash was located. After they supplied the map to the CAP’s North Dakota Wing, state and local authorities, they were able to then discover the passengers who were all fatally injured.

Details from the cellular forensics data and the radar analysis show that the plane may have been destroyed while it was still in the air; however nothing has been confirmed yet.

The cellular devices of the three deceased plane passengers were used by the cellular forensics experts to detect, to the meter, exactly where the plane had gone down.

Although the outcome of the search was not what the cellular forensics team, the radar analysis team and the authorities had hope for, it is amazing to see that when these two teams joined together they were able to give detailed information on exactly where the plane crash site was – all in record time!

At TCG Digital Forensics we offer reliable and affordable cellular forensic analysis services in Cape Town as well as Johannesburg - do not hesitate to contact us today on 021 110 0422 | 087 001 0523 or email

What is Service of Summons

What exactly is the meaning when we hear “Service of Summons”?

Related image

The service of summons needs to be composed of a number of important documents and information. If you take a look at Rules 5 and 7 of the Magistrates’ Courts Act, as well as Rule 17 in the Uniform Rules of Court you will get a detailed description of what a service of summons contains. Here are some of the most important items a service of summons needs to consist of…

- A clear form of consent to the particular judgement
- Citations of both parties involved
- The particulars of the claim
- The address of the party involved that will receive the service of summons during the legal process

The service of summons is then passed on to a legal attorney or lawyer and signed, however the party involved can sign off if they chose not to be assisted by an attorney.

The next step is for the service of summons to be drafted, once this is done it is checked thoroughly by an officer of the court who stamps the summons document and assigns it with a unique case number.

When the summons is issued by the officer of the court, it can be served.

As a value added service to our clients abroad, at TCG Digital Forensics are offering a service of summons processing/service in South Africa.

We are able to affect the service of legal processing/summons in the following areas in South Africa:

·         > Cape Town
·         > Durban
·         > Johannesburg

Please note that we may be available to offer our services to clients in other, additional areas on request. Service is executed by experienced process servers with supporting statements issued and commissioned to that effect. Generally we offer summons processing/services around the needs of attorneys, investigators and forensics audits, but we also cover a wider scope.

For additional information or discussions around the serving of legal process/summons in South Africa as well as additional areas, please do not hesitate to make contact with us directly on 021 110 0422 | 087 001 0523 or email

The latest Digital Fraud Investigation trends to look out for...

When it comes to the business world, being prepared for the future is key. But what digital fraud investigation trends do we have to keep our eyes open for in the future? 

Image result for Digital Fraud Investigation

At TCG Digital Forensics, our Certified Fraud Examiners offer digital fraud investigations using a unique set of expertise in detecting, preventing and then investigating fraud – allowing your business to uncover fraud sooner and avoid losses that can negatively affect your organization. No organisation is completely safe from fraud and the damage that it can cause. From large corporations to small family-run businesses, fraud is often inescapable, resulting in a devastating outcome.

Our CFEs offer digital fraud investigations in South Africa that can protect you, your organisation and strengthen your overall anti-fraud efforts. We offer a range of digital forensics services including digital fraud investigations in South Africa which can protect you, your organisation and strengthen your overall anti-fraud efforts.

Do not let the fraudsters damage your company or business in the years to come, here are the latest digital fraud investigations trends to look out for…

Identity theft will evolve – It’s nothing new to digital fraud investigations, but identity theft fraud will take new and more sophisticated steps to steal your private information and data.

Rapid growth of fake accounts – From internet trolls to fake news, there is always an overflow of fake accounts, but as tech grows rapidly so will the creation of sham accounts

Fraud detection and machine learning – Fraudsters will continue the trend of focusing on popular industries including travel, tech and fashion, meaning digital fraud investigations will be on the rise.

As you’ve seen will regards to the digital fraud investigations above, with new technology advancing at a rapid rate, so will the digital fraud investigation trends.

Tuesday, 4 December 2018

Let us recover your Digital Evidence quickly and easily!

People use their computers for almost everything; many of these things can be used against you. Hiding money, illegal activities, inappropriate emails and just about anything you can think of.

Image result for digital evidence

Often, if you are trying to hide something, you’ll make an effort to completely clean out your computer by deleting “everything” and reformatting. The problem is, when you contact IT support and you are told that all is lost, they probably have no idea what a digital forensic investigator can do!

The harsh truth is that the evidence is still there waiting to be found you just can’t see it. The only question is – do you want it recovered or not?

Many businesses that have a disgruntled employee, or feel that an employee is involved in unacceptable activities at work, may want to acquire some digital evidence, they can use a digital forensic investigator to recover all the evidence that they need.

We at TCG Digital Forensics are pleased to provide all the evidence that you need off of a computer, cellular device, laptop or tablet. The obvious advantage that we have here is that we recover digital evidence that few others could and keep all affairs private.

Need something recovered? Don’t hesitate to give us a call on 087 001 0523 or email

Wednesday, 10 October 2018

What to do when your Hard Drive eventually gives in

Has your hard drive been giving you trouble recently? Has it been acting strange – making noises, moving extra slow and making it almost impossible to find your files? Don’t worry you’re not alone, every hard drive eventually gives in, so it might be time to say goodbye!

Image result for hard drive fail

When your hard drive is close to giving in, always look out for these signs…

- Strange noises
- Files becoming corrupted
- Crashing
- Slow speeds

These are the most common signs you’ll see, especially if your hard drive is a few years old. If you have an old spinning hard drive, the moving parts can deteriorate over the years causing it to break.

New hard drives, such as solid state drives (SSD) do not have any moving parts, however they too will eventually break when the storage cells have degraded. Although, keep in mind that solid state hard drives are much more reliable and last a lot longer.

Image result for hard drive failOver the years your hard drive may fail gradually, unless it is exposed to excessive heat or physical trauma. So, it is best to always keep a watchful eye on your hard drive’s health, this way you can make sure you are prepared and avoid losing all your precious data. However sometimes the inevitable happens and your hard drive does fail, this is when it is time to call in the professionals.

We offer detailed drive analysis and recovery of artefacts and data all in one. Using a physical image of the hard disk drive, we are able to provide a deep scan of deleted items and trace elements from a hard disk drive.

We use world leader Magnet Axiom for hard disk drive analysis along with a handful of proprietary tools and industry accepted technologies. While we are able to offer on-site triage and acquisition, data analysis is best done within our lab as it is a time consuming and resource intensive operation. We run the latest i7 processing units to minimise analysis time and deliver fast results in the form of a portable case file that you may interrogate at your convenience.

We follow a full secure chain of custody from device acquisition through to analysis and return of exhibits. Our digital forensics lab facility is based in Cape Town – please feel free to contact us on 087 001 0523 or email

Wednesday, 3 October 2018

Cellular Best Practices for At-Risk Individuals

Image result for using computer


· Register a unique email address to use when setting up your phone. Do not use your usual email address. You can add that later as a functional email account.

· Use a totally unique password for the email account with which you setup your phone.

· NEVER give anyone the above email address or password and do not use that email address for anything else.

· iPhone is safer than Android – provided that you follow these guidelines – specifically around using an anonymous email address.

· Always use solid, complex passcodes.


· Enable encryption to secure your data if your phone ever gets lost.

· NEVER migrate data between phones. Rather back the data up and transfer it separately.

· NEVER hand your phone to anyone. Keep it in your hands if you need to show them something.

· Avoid linking your phone to any computer you do not have control of.

· KNOW what data you are backing up to Google, WhatsApp etc. be sure it is the minimum required information and no more.


· Keep apps to a bare minimum – if you don’t use it or need it, take it off!

· Never jailbreak an iPhone or root an Android device – only load apps from the relevant app store.

· Avoid using Wi-Fi. Only use Wi-Fi that is manually configured with a hidden SSID and Mac Addressing linking your phone to it. Outside of this, leave Wi-Fi OFF completely.

· Unless you absolutely must use Bluetooth – disable it

· Ensure that Kaspersky or Bitdefender are loaded on your device.

· Make sure that your handset is configured to automatically update your operating system – security vulnerabilities are exposed regularly and fixed. You need them!

For a wide range of digital forensics services including fraud investigations, CFE in South Africa, cellular forensics, service of summons, penetration testing, data recovery and so much more - give us a call now on 087 001 0523 / 021 110 0422 or email For more information visit our website here...

Wednesday, 8 August 2018

11 Common Types of Fraud

When you become the victim of fraud, not only do you have to deal with the aftermath of someone scamming you, such as financial loss, but you also have to deal with the emotional side of it.

Image result for fraud

There are a range of different types of fraud, either way all of them can cause feelings of anger, devastation, fear and frustration. 

Do you think you have been the victim of fraud? At the TCG Forensic Division, we offer a range of digital forensic services, including fraud investigations. Please feel free to contact us on 087 001 0523 or email to have a confidential discussion around your particular requirements.
Here are the 11 most common types of fraud to look out for…

1. Insurance Claim Fraud. People who make false claims, such as stage accidents, to receive insurance money from their insurance company. This can be a difficult type of fraud to investigate because some injuries can be difficult to medically identify and debate.  

2. Corporate Fraud. This includes fraud issues such as theft of information, such as private client information. This kind of fraud can lead to a damaged business reputation.

3. Financial Fraud. Evading tax, public corruption, healthcare fraud issues, telemarketing fraud and terrorist financing are all part of financial fraud.

4. Identity Theft. Those who are the victim of identity theft will have to look out for suspicious loan or credit card applications, strange withdrawals from bank accounts as well as using a different name to receive benefits.

5. Internet Fraud. Of course, this type of fraud always occurs online where a cybercriminal will try and take advantage with ransomware or phishing scams. Usually this includes stealing private information such as banking and login details.

6. Corporate Slip & Fall. Fraud like this is planned out by individuals in order to file a claim. People will go as far as to pretend to fall or throwing liquid on the floor in order to ensure a slip.

7. Transit Fraud. Companies who offer transportation, whether it is a bus, train or taxi, will often see fraud such as this where passengers will not seat or secure themselves properly, leading to them falling and injuring themselves on purpose.

8. Ticket Fraud. In some countries, the level of ticket fraud is significant. People will buy tickets online from a fake website; these tickets are not legitimate and have often already been used or do not exist.

9. Mechanical Fraud. This type of fraud is not common, however there are many people who fall victim to mechanics who scam their customers. Often they will be overpriced or they will request things to be fixed that are not broken.

10. Expense Claim Fraud. This often happens in large companies where employees will pocket run over business expenses for themselves. An example could be asking for money to stay in an expensive hotel when in fact they are staying in a cheap accommodation and pocketing the remainder.

11. Inventory Theft. Large companies face the issue of inventory theft when unsupervised employees steal products or order more than the store needs and take the rest for themselves. This may include “expired” food products when they are in fact not expired at all.

Wednesday, 11 July 2018

What is a Due Diligence Investigation & why should one be conducted?

A due diligence investigation needs to be conducted to assess the qualifications and track records of the people involved in a certain business transaction. This type of investigation needs to identify or reveal if there are any potential inconsistencies, misrepresentations, omissions or controversies.

Related image

So – why should a due diligence investigation be conducted?

Any business that is involved with IPO’s, mergers, acquisitions, joint venture, partnership deals and other business situations, should always contact an expert to discuss certain needs and assist in a professional due diligence investigation. At the TCG Digital Forensic Division in Cape Town, we offer all forms of digital forensic services, including due diligence investigations – do not hesitate to give us a call on 087 001 0523 or email if you wish to have a confidential discussion around your particular requirements.

Our digital forensic services can bring to your attention any past dealings and behaviour which can give you an inside look into what you can expect from your business dealings in the future.

Here are some of the most important benefits of due diligence investigations….

> Reduced risk
> Minimised possible embarrassing situations
> Complete peace of mind
> Ensured reliability
> No hidden surprises
> It is a vital part of your business practice

Related image

If you fail to do a due diligence investigation, you may be inviting certain issues and even business disasters – get your due diligence investigation done and you will be able to spot and eliminate the problems.

Wednesday, 4 July 2018

Why you should use professional forensic image enhancement services

Imagine a crime happens and your CCTV cameras catch the entire scenario, the only problem is that the video or images are not of high enough quality to show the criminals face or the vehicle registration number.

Image result for image enhancement

If there are no good frames available that means that case will go unsolved.

However, digital forensic experts often have the means and the correct specialized software to digitally enhance an image and aid in solving the case.

Our TCG digital forensics team are able to provide static image enhancement as well as digital video enhancements. Please bear in mind that results are most often dependant on the quality of the original image and we will require the highest resolution output that you are able to deliver before we can assess what the enhancement potential will be.

Related image

While we would dearly love to provide a “CSI” type service where the smallest reflection in someone’s sunglasses reveals a crystal clear image of a suspect – this is limited to what we term “the elusive Hollywood” computer system.

We will gladly review your image(s) at our Cape Town or Pretoria offices and offer you a no-charge assessment of how much adaptive work can be done with the images you have available. From that point we will be able to offer an estimate of costs. Contact TCG Forensics on 087 001 0523 or email

Wednesday, 13 June 2018

4 Important Steps to take if you’ve been Hacked!

Have you ever been hacked? Whether you are an individual or a business owner, getting hacked is a terrible experience that can cost you time, money and possibly destroy your business.

Image result for hacked

Hackers can get away with a lot of things, including stealing your sensitive data and your money. This data, whether it is your personal information and passwords or your customer’s private records can be used to target you in future attacks.

Here’s what you can do to recover from a hack…

Contact Customer Services. If the hack is on your Facebook, Twitter, Instagram, etc. profile be sure to contact their customer services as soon as you possibly can. Social networking companies are getting more efficient at cracking down on stolen accounts, so they should be able to help you fairly quickly.

Scan your System. If you manage to get your account under control, always check your entire system as well for suspicious files or strange behaviour. Simply fixing your Facebook profile page doesn’t mean all your other data hasn’t been affected. Always go through your entire system, this includes your emails, online banking, apps, etc.

Do the Basics right. If you’ve been the victim of an attack, you need to make sure you do through all the basics and get them right.

-- Change your passwords on a regular basis and always use a different passwords
-- Use two-factor authentication
-- Install a trusted anti-virus software
-- Patch and update your software on a regular basis
-- Back up your data
-- Be wary of putting too much personal information on your social media accounts

Contact the Professionals. If all else fails and the hack is too much for you to recover from on your own – always contact the professionals before you do anything else that may damage your system even more. While most companies have in-house and contracted skills to manage and administer their network, it’s not uncommon that outside specialist skills are needed to recover from a serious breach. Contact the TCG Digital Forensics team for quick, reliable and affordable hacking recovery.

When you have been hacked you may feel that you have lost a lot more than just your data, you’ll feel embarrassed and the business you’ve put so much time and money into may be compromised. Get your dignity back by using these 4 important steps!

Wednesday, 9 May 2018

Do you know the History of Digital Forensics?

Before the 1980s, crimes involving computers and digital devices were dealt with using existing laws. So, the field of digital forensics is relatively new. While its history may be short, it is quite complex.

Image result for old computer typing

As the years went by, the range of digital crimes being committed increased, but it was not until the 1980s that federal laws began to include computer offences. Canada was actually the first country to pass legislation in 1983, followed by the US Federal Computer Fraud and Abuse Act in 1986.

The fact that computer and digital crimes grew so much during the 1980s and the 1990s caused law enforcement agencies to start making specilised groups to deal with the technical aspects of the investigation. For example, the Computer Analysis and Response Team that the FBI formed in 1984.

Throughout the 1990s there was a high demand for these new investigative resources, this lead to the creation of regional and even local level groups to help handle the load. But, it was not until 1992 that the term “computer forensics” was actually used in academic literature.

Since the year 2000, a lot of people and agencies have written and published guidelines for digital forensics. A European lead international treaty, the Convention on Cyber crime, came into force in 2004 with the aim of reconciling national computer crime laws, investigative techniques and international co-operation.

Image result for digital forensicsThe issue of training also received some attention. Companies, such as forensic software developers, began to offer certification programs, and digital forensic analysis was included as a topic at the UK specialist investigator training facility.

Since the late 1990s digital devices have become available everywhere, basically everyone has a phone or some kind of digital device. Devices have advanced way beyond simply communicating, they are great forms of information, even for crime not usually associated with digital forensics. However, digital analysis of phones has lagged behind traditional computer media, mostly because of problems over the ownership of the devices.

The complex field of digital forensics will always have unresolved issues. Many issues will include; increasing size of digital media, the wide availability of encryption to basically everyone, the variety of operating systems, increasing number of people owning multiple devices and lets not forget the legal limitations on investigators.

The TCG Digital Forensics Division is based in Cape Town and combines the experience digital forensic seasoned investigators with the latest technologies to achieve the results that you require! We do all forms of Digital Forensics such as Cyber Forensics (Penetration Testing / Hacking Recovery / Cyber Investigations), Cellular Phone Analysis, Hard Drive Analysis, Device Acquisitions and Due Diligence Investigations.

Wednesday, 25 April 2018

What can you do to keep your Broken Phone’s Data Safe?

Only you know how valuable the data on your mobile phone is, what you do with the information is up to you. So, do you know how to keep your personal data safe on your phone when it suddenly breaks?

Image result for cracked phone

The answer isn’t a simple one – how do you use your phone when the screen is cracked? It happens a lot more often than you think. The question is what do you do to protect your data when you can’t use your phone properly?

Here are a few things you can do to make it difficult for anyone without professional forensic skills to get to your stuff…

      1.       Use a secure lock screen – Swiping to unlock is easy enough for a monkey to do, so make sure you always lock it properly!

      2.       Set up Find My Device – Install Find My iPhone on your iPhone or Find My Device on your Android from Google Play Protect. Even if you can’t use the phone you can still access the data.

      3.       Change your Password – Use another device to change your Google password, this extra step will stop anyone from accessing your data and ensuring damage is minimal.

      4.       You may need to speak to a Professional – If you feel your data is precious enough to stress over, then you need to hire someone such as a professional digital forensic expert to assist you in retrieving or destroying it.

Related image

Looking for both cellular and computer forensics services? TCG Forensics is a digital forensics company in South Africa that is always at your service. We generally work directly for private investigators, polygraph examiners, attorneys and similar parties although we can accept a direct brief from a corporate entity that requires our services. We are able to assist bona fide law enforcement agencies with the procurement of forensic software and hardware once credentials have been verified.

Tuesday, 13 March 2018

How does a Criminal hack your Cellphone?

A lot of people would be really surprised if they knew how easily hackers gain access to cellphones to steal personal and private data or information.

Image result for holding smartphone

These days cyber criminals have software and systems that can hack your mobile phone with just your number, where they listen to your private calls, read your messages and emails, access your online banking and anything else you store on your phone.

A hacked phone is a concern to most people, but it is even more of a concern to massive enterprises and businesses across the globe. Cellular phones are used daily by businesses and often sensitive information is shared over calls and through messages, meaning a hacked phone can lead to loss of financial data and important customer information!

What is even scarier is the fact that tutorials on how to hack cellphones can be found on the internet for just about anyone to access. This is why it is so vital for everyone to set up security to protect their mobile phone and communications.

Did you know that every year billions of phones are hacked because they are unprotected?

Image result for cell phone hack

Securing your phone and communications from hackers requires multiple steps including creating secure, unique passwords, avoiding public Wi-Fi connections, and diligence in checking links in emails and messages to ensure authenticity before clicking on them, and encrypting calls and messages.

Are you looking for professional digital forensic services which include cellphone analysis, penetration testing, image enhancements and so much more? Call the TCG Digital Forensic’s team on 021 110 0422 or email

Wednesday, 7 February 2018

Smartphone Safety for Children

It’s 2018, we’re more connected than we were a few years ago and we’re continuing to grow as time goes by.

Related image

These days, teenagers and even small children are getting caught up in all the new technology that is being introduced. The ability to communicate with friends with the push of a button is a sought after thing, and having a smartphone is a privilege that all teenagers assume they should have. However smartphones can bring a few dangers with them.

It’s about time you sit down with your children and have a chat with them about smartphone safety…

You will never be able to remove them completely from the world of technology, so make sure to sit down and have an educational conversation instead of arguing with them.

Who are they talking to? Are they chatting to their friends or someone they met online? Let them know that people are usually not who they seem to be online and they should apply “stranger danger” online as well as in the street.

What kind of content are they looking at? Are the apps, games, videos, etc. they’re looking at appropriate for their age? Remember to be aware of any cyberbullying is taking place.

Are they texting and driving? Texting and driving is beyond dangerous, especially for young teens who have just started driving and have little experience. There are apps you have use to control this, but there should be strict rules in place too.

Related image

Do you have any questions about smartphone safety or cellular forensics? At TCG Digital Forensics, we offer a range of services, from cyber forensics and mobile phone analysis to image enhancements and suspect profiling. Contact us on 087 001 0523 or

Wednesday, 24 January 2018

How to know if your Phone has been Hacked

Are you worried that someone might have hacked into your cell phone? Don’t worry you’re not alone! There are hackers all over the world who are looking to hack into your phone and invade your privacy.

Related image

If you suspect that your phone has been hacked, here’s how to check…

  • Your battery is going dead a lot quicker than usual
  • Your phone always feels warm
  • You are going through a lot of data lately
  • There are pop-up notifications everywhere
  • Unauthorized purchases on your credit card or posts on Facebook or Twitter
  • Your phone shutdowns for no reason
  • You’re having issues with echoing during calls

Here’s how to avoid contracting spyware…

  • Don’t click on strange links
  • Lock your phone at all times and use a PIN
  • Only download apps from secure sources
  • Be careful when buying a second-hand phone

Your cell phone is the perfect spying device – it allows hackers to listen, track and view everything you do without you realising it.

Related image

Remove all traces of any spyware or malware from your cell phone with our affordable, effective cell phone debugging services. Contact TCG Digital Forensics and secure your cell phone today. Email or call 087 001 0523 | 087 001 0511/2

Thursday, 11 January 2018

The most important skills you need for a career in Digital Forensics

Tech meets criminal justice in the field of digital forensics--a branch of forensic science dealing with recovering and analyzing information from data storage devices (including computers, phones, networks, and more). Digital forensics examiners help track down hackers, recover stolen data, follow computer attacks back to their source, and aid in other types of investigations involving computers.

Image result for digital forensics

Want to know what it takes to become a digital forensics examiner? Here are some key skills needed for the career…

Analytical talent: It stands to reason that anyone in an investigative role needs to have the analytical skills required to piece together information and solve the case. Cyber security expert, Ondrej Krehel says: “High speed of analytical thinking, and precise observation skills, which are often gained and tested at high tech military and intelligence cyber units are also important skills to have." The ability to find patterns and make correlations is crucial in the investigation process!

Computer science/tech skills: Since digital forensics is such a technical field, it helps to come from a background studying or working with computer science. An important quality of any great digital forensics investigator is a deep understanding of how technology really works. If you have experience with computer systems, programming, or other related fields, this will help you transition into digital forensics since you will already have a general knowledge of how technology and networks work, how digital systems interact with each other, and what is possible from a compromise perspective.

Understanding of cybersecurity: The field of digital forensics is all about solving cybercrimes--and who has a better knowledge of those than cybersecurity professionals? It's impossible to guard against data breaches without knowing the techniques being used to target systems, and this same knowledge that helps to prevent crimes also is useful in solving them. Many of the most talented forensics examiners will have had experience working on a cybersecurity team.

Related image

Organisation: You can have a messy desk and be a great digital forensics examiner--but mental organisation is a must, as is organised record-keeping. Being extremely organised and thorough is a must! Documentation of your findings is necessary as it is often required to present them to others such as attorneys and judges.

Communication skills: In relation to the above point, digital forensics doesn't exist in a vacuum. The team you work with and people you work for need to know what's going on, meaning that you need to communicate it to them. According to Ondrej Krehel, "Having both strong writing and speaking skills is extremely important to effectively communicate your findings to other team members and your clients."

Desire to learn: Cybercrime is constantly evolving, so it's a must to keep your knowledge up-to-date and always seek out ways to be better at your job. To be a digital forensics examiner, you must have great pride to be one of the best in what you do. Self-critique skills for constant improvement of your work is a very desired trait!

As for higher education, degrees are helpful in breaking into the digital forensics field, but what really establishes someone's credentials is the product of their work and the ability to conduct digital forensics in very detail-oriented manner!
At TCG Digital Forensics, we do all forms of Digital Forensics such as Cyber Forensics (Penetration Testing / Hacking Recovery / Cyber Investigations), Cellular Phone Analysis, Hard Drive Analysis, Device Acquisitions and Due Diligence Investigations.