Version française   Home | Contact Us

Data and file theft


Data and files can be stolen from within a company, or by a successful intrusion.

The means of doing this are huge and range from rapidly copying a computer file onto a USB, to placing spy software probes, to slightly modifying a messaging program so that it duplicates e-mails and re-directs them to a competitor’s address.

In spite of the protective measures taken, file duplications, theft and data extraction still happen.

Finding proof is often difficult. But a very fine analysis of several parameters can be used to gather the relative - and sometimes even blatant - evidence.

© 2017 Lerti: Computer forensics - Legal clauses - Computer forensics, evidence collection, traces, electronic investigations - Compiled by Kreatys