- What We Do
1Individuals and companies are receiving online attacks at an ever increasing. Many times, these attacks originate from their competition, their ex-employees, and sometimes from very upset past clients but in a hidden format. Unfortunately, it is very easy for a single person, or a coordinated group of companies, to seriously harm a business in 24 hours or less but nothing can be done without performing identification of the parties involved.
2Companies and individuals are undergoing a wide variety of issues online ranging from defamation, to trademark infringement, to counterfit goods being sold, to greymarket diversion, to a host of other cyber crimes. Our STOPPING services are aimed at helping corporations, financial institutions, law firms and individuals bring these issues to a halt, even when the parties causing the issue are unknown or unproven.
3Every day we receive calls from businesses and individuals stating that their computer or network has been hacked. Most of the time valuable information has been stolen, their computer is being used against them to Stalk, Defame, Blackmail or use as a pivot proxy to attack other people making it look like it came from your computer. Investigating this type of crime is both time critical and evidence critical if you want to have a chance at identifying the perpetrator. At CIS our seasoned Cyber Investigators utilize advanced tools and Computer Wire Taps to assist you in determining who, what, when, where and how you have been hacked.