Diagnostics & Log Assessments

Investigative review of data breach or hacker activity always involves assessment of networks, websites, and activity logs.

  • Review of website vulnerabilities and weakesses
  • Log activity examination - suspicious IP addresses
  • Log activity examination - suspicious commands and behaviours
  • Log activity examination - other
  • Network evaluation
  • Best practice website development principles