Här ska det bytas till en sökruta


Media reports of attacks on organisational IT environments, such as ransomware or information leaks, are growing in number. It is important for targets of an attack to analyse how the perpetrators did it so that the organisation can protect itself in the future. But there are other occasions when IT forensics can be highly pertinent. If, for example, there are suspicions that someone has improperly used the company’s resources, matters can be investigated to gather evidence that confirm or deny the actions.

IT forensics at Cybercom

Regardless of how well you protect yourself, you can still end up in situations where you need to know exactly what happened. With our depth of experience in IT forensics, Cybercom can help. Our expertise covers everything from searching single PCs for information leaks to examining servers after a virus attack. We apply generally accepted procedures to gathering evidence and prepare a report that explains what happened and when it happened.

If the attack was carried out using malicious code written specifically for the attack, we can also reverse engineer the malware. This gives you more information about the function of the malicious code, the damage it has caused and how you can eliminate it.

Assisted by our security consultants, you can form a clear picture of what happened. As no two IT forensic assignments are alike, please contact us for more information about how we can help in your unique situation.

What should you consider if you are the victim of an IT attack? Regardless of whether you have been attacked by ransomware, a virus or cryptominers, the key is to act swiftly to minimise the impact of the attack and maximise your chances of securing solid evidence of what happened. A few important points to remember when the attack is discovered:

  1. Do not touch the affected system
  2. Protect your backups – they should be offline and not connected to the network
  3. Contact Cybercom

We help you investigate what happened and whether there is risk that the attack has spread to other systems. Based on this information, we jointly prepare a strategy with plans for restoration and recommendations for development to improve system security going forward.

Do not hesitate to contact us to discuss how we can help you.


Johan Persbeck

Business Unit Leader

Make sure all fields are filled with valid information

Thank you, your message has been sent