The specialists of Kurtz IT Service keep their IT architecture, meaning software and hardware, consistently up to date with the latest state of the art. In this way, we are always prepared to respond to innovations in modern IT developments.
Digital traces are divided into user data and external access. Naturally, we do not involve ourselves in your sensitive activities, even though this is sometimes a major concern for our clients. Rest assured: we have absolutely no interest in viewing your personal data! Irrelevant findings in the area of sensitive data are neither addressed to you, nor stored, nor forwarded to third parties.
The Edathy case shows it clearly: the misuse of the internet is omnipresent and extends through all levels of society: child pornography, industrial espionage, misuse of work equipment for private purposes, fraud, sabotage and more. IT forensics is a growing field within criminal case analysis.
In assignments within the commercial sector, as few employees of Kurtz IT Service as possible are naturally involved in the investigation process, in consultation with the respective management, in order to prevent subsequent trace concealment measures. The enemy often lurks within one’s own ranks. If necessary, our specialists will be introduced into your company under a credible cover.
Areas of application include, among others:
Whether all points can be fully clarified depends primarily on the available data material.
Which components can our IT specialists analyse (an incomplete (!) selection):