Departed Employee Protocol

When employees exit the organization, assessing recent activity may limit loss and exposure.

FORENSIC ANALYSIS OF


System Registry

We detect whether portable drives were connected to the employee’s computer.

Internet History

We analyze and report on user activity.

Accessed Files

We examine and report on the type, quantity, and location of files the employee accessed in the days and weeks before departing.

Applications and Platforms

We assess the employee’s use of potentially risky platforms like DropBox and iCloud.

 

Optional Additional Services


RISKCOVERY®

Our investigators use RISKCOVERY, a powerful software platform that leverages conceptual analytics to find key data within millions of documents and emails.

 
  1. Your Name(*)
    Please let us know your name.
  2. Your Email(*)
    Please let us know your email address.
  3. Please prove you are human
    Invalid Input