Find out what
really happened

Hire a specialist to investigate what really happened

Substantial resources are required should a company fall victim to cybercrime, such as accuracy and solid experience to properly conduct an investigation. Reasons for this are many, for example, cyber-criminals ‘boobytrap’ computers so that evidence is destroyed when someone use the computer after the crime was committed.

Furthermore, evidence must be secured in a way that makes it valid in court. Sentor has extensive experience performing cybercrime investigations, using the procedures demanded by Swedish and international regulations.

Socialdemokraterna – investigation that lead to prosecution

One example of our competence in cybercrime investigations is our analysis of the hacking of Swedish political party Socialdemokraterna during autumn 2006. In this investigation, Sentor was able to secure evidence leading to prosecution of the suspects.

Like more information? Please send your e-mail address and we will get back to you!

More information
What methodology do Sentor apply?

We are investigating cybercrime using our well-tested methods. First we’ll track, preserve and prepare evidence. Then we’ll reconstruct all activities in the network at the time of the crime, step by step, documenting times and dates, images and graphics. The result will be a solid testimony that clearly and simply visualize what has happened, what has and has not been done and who is guilty of what.

Video: BBC visited Sentor

Sentor's technical security consultant demonstrates how easy it is to exploit a security hole in an application and get access to critical information. He even takes control of the microphone and webcam on the journalist’s computer.

Read more!

Want to get in touch?