slideshow 1 slideshow 2 slideshow 3

WestNet Computer Forensics and Network Security Professionals in Los Angeles

WestNet provides Electronic Discovery (eDiscovery), Data Recovery, Expert Witness as well as Network Security and PCI Compliance Assessment Services.

At WestNet Forensic Services we can help you secure your critical digital assets. We can identify your IT security risks, exposures and vulnerabilities to cyber threats such as viruses, Trojans, and hackers. If you're looking for an external security analysis, penetration test, or a security assessment, we will help!
PCI Compliance

WestNet Computer Forensics has expertise with all types of cases where electronic stored information needs to be recovered, processed and analyzed. We are based in Burbank and Service Los Angeles and Orange County Area.

WestNet works with all types of businesses including individuals, small businesses, law firms, government agencies and fortune 500 companies in assistance with electronic data discovery.

We Provide IT Investigation, Computer Forensic, Security Audit and Litigation Support Services

As is often the case with security compromises, it's not a matter of if your company will be compromises, but when.
Computer forensics is the preservation, identification, extraction, interpretation , and documentation of computer evidence. Often digital forensics is referred to as "the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law."
Cyber activity has become an important part of the every day lives of the general public. According to the EC-Council, eighty-five percent of businesses and government agencies have detected a security breach. The Examination of digital evidence has provided a medium for forensic investigators to focus on after an incident has occurred. The ultimate goal of a computer forensic investigator is to determine the nature and events concerning the crime and to locate the perpetrator by following a structured investigative procedure.

Computer Forensic Flaws and Risks

Computer forensics is in its developmental stage. It differs from other forensic sciences as digital evidence is examined. There is a little theoretical knowledge to base assumptions for analysis and standard empirical hypothesis testing when carried out lacks proper training or standardization of tools, and lastly it is still more "art" than Science.

Forensic Service Tech

Recent Blog Posts

Chardon Police online with computer forensics

Chardon Police Department is about to go more high-tech.

The 17-officer agency in semirural Geauga County will be adding computer forensics to its repertoire this year.

Five-year officer Chuck Pirnat recently was trained in this specialization -- pertaining to recovery of electronic evidence found in computers and digital storage media -- and will be putting it to use once the $13,100 worth of equipment has arrived.

Institute of Electrical and Electronics Engineers (IEEE) Suffers Security Breach, Cautions Members

Recently, the Institute of Electrical and Electronics Engineers (IEEE), the world's largest and renowned technical professional association notified members of possible data breach. The association identified the unauthorized access to customer database in December. Computer forensics professionals were engaged to investigate the security breach incident. In February, the forensics investigators identified that a file containing customer data was deleted from the computers of IEEE in November last year.

Computer forensics expert takes stand at Twitchell trial

The jury in the Mark Twitchell murder trial has heard from a computer forensics expert who copied the laptop hard drive that was found in Twitchell's car.

While investigating, the court heard there was a key phrase the EPS constable came across that made him sit up and take notice.

Constable Michael Roszko plugged the laptop into his work computer which has a couple of forensics programs. He then found a deleted file that he told the jury he thought was relevant to the investigation.

Mobile Devices & Social Networks are Key Malware Targets

Consumers using Facebook and other social media sites, or using mobile devices, are among the key targets of malware according to the latest Internet Security Threat Report published by anti-virus company Symantec.

The company's 16th report still sees attacks in which specific industries or even individuals, are targeted as one of the main threats, but highlights the developing vulnerabilities that social media and mobile devices open up.

Microsoft sets mammoth Patch Tuesday, will fix 64 flaws

Microsoft today said it will patch a record 64 vulnerabilities in Windows, Office, Internet Explorer, Windows graphics framework, and other software next week, and tie a December 2010 record for the number of security updates it issues.

The 17 updates -- Microsoft calls them "bulletins" -- tie the count of December 2010. The bulletins that will ship next Tuesday will include 64 patches, Microsoft said, 15 more than the previous record of October 2010, and 24 more than the 40 of the former second-place collection of December 2010.

Breach leaked names and emails of thousands of shoppers

Baltimore - They're a company that sends out million of emails a year, but you've never heard of Epsilon until now. That's because this internet marketing company is recovering from a security breach that impacts you. ABC2 News Joce Sterman has the steps you need to take to protect yourself in this week's Scam Alert.

Chances are you've handed it over dozens of times to get your hands on a deal. Retailers often ask for your email so they can send you specials or coupons. But thanks to a security breach, something else could be headed to your inbox.

U.S. can conduct offsite searches of computers seized at borders

Laptop computers and other digital devices carried into the U.S. may be seized from travelers without a warrant and sent to a secondary site for forensic inspection, the U.S. Court of Appeals for the Ninth Circuit ruled last week.

The ruling is the second in less than a year that allows the U.S. government to conduct warrantless, offsite searches of digital devices seized at the country's borders.


Copyright WestNet Consulting Services, Inc. 2015.Computer Forensic Company: Sitemap