Departed Employee Protocol
When employees exit the organization, assessing recent activity may limit loss and exposure.
FORENSIC ANALYSIS OF
We detect whether portable drives were connected to the employee’s computer.
We analyze and report on user activity.
We examine and report on the type, quantity, and location of files the employee accessed in the days and weeks before departing.
Applications and Platforms
We assess the employee’s use of potentially risky platforms like DropBox and iCloud.