Connected Storage Device Analysis
Did a key employee just leave your company? Are you concerned that he or she may have copied sensitive client data such as:
- Customer lists
- Databases
- Models
- Pricing Information
- Supplier rebate and procurement data
- CAD and Engineering Drawings
- Software Code
- Financial Data
- Employee Earnings Information
Most employees leaving an employer have difficulty resisting the urge to plug in a portable USB storage device, such as thumb drives, iPads, camera storage cards, CD/DVD media, and copy much of this information, and more, for later use at a future company. Sales people, especially, are often guilty of copying a mother load of information onto these portable USB storage drives and then making use of this kind of information to recruit away employees, suppliers, and clients.
Forensicon can often identify devices recently connected to a computer and can provide the serial number of the devices, volume name and date and time of connection. The initial connection of a USB storage device approximate to an employee’s resignation is almost a sure indicator the employee engaged in efforts to misappropriate company data, often for later use at a competitor.
Further forensic analysis and review of link files can help to identify files that were transferred to external media. Forensicon has helped clients seek intervention of the court when such findings are discovered. In some situations, Forensicon’s report can be used to negotiate a settlement with the former employee to avoid the need for litigation.
Forensicon has had more than ten years of experience in the computer forensics field and has performed more than 500 investigations involving trade secret theft allegations. Please call Forensicon today at 888-427-5667 for a complimentary consultation regarding your investigation needs or contact us.