Home Computer incident investigation

Computer incident investigation

Computer incidents are illegal acts in the field of computer information related to the storage, processing and transmission of data. Incidents may include: seizure of computer equipment, data interception, unauthorized access, and data manipulation. Such misdemeanors are revealed by experts with extensive experience in investigating computer incidents.

Much of the counteraction is carried out using well-established methods of incident investigation and has a number of features, governed by standards and certain ethical standards. With the IRT service we are ready to help our clients.

IRT is a rapid response team to cyber incidents. The minimum package of services includes:

  • Consulting with experts
  • Investigation of the IS incident
  • Penetration testing
  • Scan web applications and resources
  • Reports on individuals and legal entities from open and closed sources
  • Comprehensive forensic investigation of digital evidence of incidents
  • Monthly newsletter with information about vulnerabilities actively used by hackers and recommendations for increasing protection
Want to know more?

Get a consultation
By ordering the IRT service, you will receive
  • Additional assistance to your own team of security professionals
  • Preparation of documents for transfer to law enforcement agencies
  • Information in the field of cybersecurity
  • Investigation of cybercrimes
  • Verification of potential candidates or partners
  • Collection of digital evidence base
  • Conducting external IS audits
  • Finding intruders
Benefits of computer crime investigation from FS Group
Individual approach
Individual approach

A separate team of required specialists is formed for each crime investigation. This creates a new plan for each task

Application of FS Group technologies
Application of FS Group technologies

Own products and services, including products that have no analogues, are used to quickly investigate crimes

Experience and expertise
Experience and expertise

Experience of specialists from 5 to 20 years in information security both in Ukraine and in international markets. From 2 to 5 certificates by specialties

Related products and services

Simulator of sending phishing emails in order to understand the probability of a successful phishing attack on the company and plan activities to increase the level of education of employees to counter phishing attacks

• Integration within the corporate network
• Development of phishing pages for your requirements
• User texts in emails
• Setting up the system for a mail server


WEB-solution that helps to verify employees and contractors on data from open and closed sources, as well as with Big Data FS Group

You get access to unique data, make it easier for employees of different departments, for example:

• purchasers
• HR
• compliance officers
• lawyers
• financiers

and among other things - you get a centralization and a single point of entry of data, which can work with different departments of the organization


Package of services for investigation, analysis and investigation of information security incidents

The minimum package includes:
• consulting with experts
• investigation of the IS incident
• comprehensive forensic examination of digital evidence
• reports on individuals / legal entities from open and closed sources
• a monthly newsletter with information about vulnerabilities actively used by hackers and recommendations for increasing the level of protection
• penetration testing
• scanning web applications and resources


Software product for detecting compromised accounts of the organization in open and closed sources

Thanks to FS MNG you can:

• identify compromised accounts, including when compromising third party resources
• prevent data leakage
• protect against the use of compromised passwords
• be informed about the leaks before it is widely covered in the media


A software product that contains a list of anonymized IP addresses in the TOR, PROXY & VPN categories sold in public and in DarkNet. Allows you to identify anomalies in network traffic, application traffic and can be used in various ways

• Proactive approach to TI collection
• More information for decision making
• Earlier provision of data and thus prevention of attack
• Compatibility with most vendors' solutions
• Complementarity with other feeds


Like many other companies, FSG uses cookie technology on its websites to improve your user experience, as well as for the correct operation of the website.

If you agree to the use of all cookies on this site, click the Ok button. To learn more about cookie technology, its benefits and how FSG uses it, check out our Privacy Policy.