Data Breach Incident Response

Forensic Recovery can help your business investigate and recover from a potential data breach.

After a scoping call, we can engage and recommend the best course of action to help you identify the cause of a breach and address any other questions you need to answer. We work with a select group of extremely experienced and efficient analysts and responders, and our rates are competitive.

Whether your copmpany is made up of a sole practitioner or a a large business, we will take your inquiry seriously. We also have legal resources to help you navigate the various laws and regulations governing data breach notification across jurisdictions.


Business Email Compromise


The business email compromise is one of the most common engagements. This typically starts with a company being notified by an outside contact that they are receiving phishing emails or emails containing malicious documents. It is critical to act quickly and responsibly to respond to an incident like this in order to determine the scope and limit any potential damage.

In many cases, attackers enact rules in a user's inbox that allows them to communicate with a contact without being detected. Often, the goal is to convince an unsuspecting contact to send a wire transfer to the attackers account.

Common Case Scenarios

  • Intellectual Property Theft
    An employee or executive leaves an employer to start a new company or work for a competitor. The previous employer ends up in a legal dispute because the employee took with him client contacts, confidential trade secrets and intellectual property, or they left a backdoor for remote access to the network at a later time. We can help determine how the employee acted prior to leaving the company or at the onset of litigation.
  • Child Pornography Charges (Peer-to-Peer))
    Internet Crimes Against Children (ICAC) task forces around the country identify and arrest potential traders of child pornography on a regular basis. We can review the Government's findings and conduct an independent examination of the digital evidence in order to determine the circumstances surrounding the charged files. Cases are often initiated through CyberTips, Peer-to-Peer/BitTorrent activity, or undercover chats on social media platforms like Kik, Telegram, and Snapchat.
  • Divorce
    Forensic Recovery can assist counsel in helping to identify, preserve, and analyze digital evidence in family litigation. Often, our work is related to location data, communications, and hidden asset leads. Working through counsel on these matters is the preferred mechanism.