security health meter Forensic Animation Penetration Testing

Security policy design & training

When it comes to security, a clear and encompassing Security Policy is vital to an organization’s health and protection. It gives employees and executives a framework for understanding your company’s attitude toward security.   What is a Security Policy? A Security Policy is a document that spells out the do’s and don’ts of how your […]

Read More

Forensic Animation

Forensic Animation reconstructs an incident in a visual format that can be viewed from many angles. Forensic Animation is intended to show the facts as accurately as possible by using data from as many sources as possible such as police or medical reports, witness statements, photographs of resultant damage, cell tower data, CCTV footage, cell […]

Read More

Penetration Testing

Penetration Testing is in-depth testing of your network’s security to determine areas where a hacker might be able to breach your system.   In order to understand how Penetration Testing is done, we look at how Hackers operate. Hackers usually follow these steps: Gather intel on your system with either manual or automated tools. Look over […]

Read More

Mobile phone imaging & analysis

Mobile devices have a file structure different from computer hard drives. There are also a number of other important differences, including these: With a computer hard disk, the user can use readily available software to wipe out data permanently. This is not so with mobile phones. Deleted text and phone calls are likely to still […]

Read More
security health meter

Security policy design & training

When it comes to security, a clear and encompassing Security Policy is vital to an organization’s health and protection. It gives employees and executives a framework for understanding your company’s attitude toward security.   What is a Security Policy? A Security Policy is a document that spells out the do’s and don’ts of how your […]

Read More

e-Discovery

e-Discovery is the study of digital information to find data of interest to an ongoing investigation or legal case. It can include: Searching a hard drive for emails, documents, or deleted files. Discovery of network- and Internet-related information such as browsing history and communications across networks. Recovery of deleted digital information. The techniques involved are varied and […]

Read More

Home

Michele Bousquet has a Master’s Degree in Digital Security from Boston University. She is currently a Digital Forensics Consultant at the School of Professional Advancement at Tulane University in New Orleans, LA. Michele also runs a blog on personal security at speakumgeek.com

Browse the Services tab for more information on the services offered.