When It Really Matters770-777-2090

Breach Scan

A number of different surveys have revealed just how vulnerable and unprepared organizations are to various computer abuse scenarios and their consequences.

FFI's Breach Scan is a highly specialized service that blends the firm's computer forensic expertise with its forensic auditing skills to help management respond to and assess the consequences of network intrusions, data compromises, unauthorized use and mitigation of legal action.

Network Intrusions & Data Compromise

In a 2014 Ponemon survey of over 1,000 corporate security professionals 55 percent lack adequate tools to determine the cause of a security attack and that 43 percent lacked adequate skills or training to determine the root cause of an attack. In addition, 38 percent would take the at least a year to determine the root cause while 41 percent would never know the root cause of the attack.

Breach Scan confirms whether three has been a network intrusion and determine if protected data like Personally Identifiable Information (PII) or Protected Health Information (PHI) has been compromised within the time required to make a self reporting determination.

Misappropriation of Trade Secrets

In a 2009 Ponemon survey of about 1,000 former employees 60 percent admitted to taking materials when they left. Furthermore, 80 percent of companies claimed not to have any kind of review effort to detect whether departing employees took anything with them.

Breach Scan answers this very important question as well as identifying what has been taken. In addition, Breach Scan performs a full assessment to determine all of the devices and media from which data were taken.

Unauthorized Use

Departed employee's are not the only ones that can cause a problem, though. Current employees can also be misbehaving.

Breach Scan can examine a current employee's computer activity to assess both their compliance or non-compliance with organizational policies as well as other issues like:

Workplace productivity.

Erroneous reporting of time, attendance, expenses and other matters.

Violation of an employee's faithful servant obligations.


As part of a settlement agreement or court ordered probation or even to avoid litigation entirely parties can agree to have their computer devices periodically examined as proof of their compliance with or abstinence from certain activities.

Breach Scan can be used to periodically examine a party’s computer devices and media to determine compliance with certain usage and activity requirements or restrictions. Each examination can typically reveal and assess the usage and activity that has occurred over an intervening period of several months and often longer. Thus, Breach Scans can be scheduled periodically and still be very effective.

Breach Scans can be tailored, targeted and optimized to achieve cost, quality and schedule considerations. Business interruption or shutdown is not required.

Breach Scan answers these questions as well as others which can alert management to a serious problem needing immediate attention.

Clients can order Breach Scans on an ad hoc, as needed basis or through retainer based service arrangements when recurring review capability is desired as part of established computer security procedures or employee termination procedures.


Your computers may be protected from an outside attack
but how about from an internal one?

When everything else has failed
Breach Scan
Is the last best line of defense



For more information about
as needed or retainer based service arrangements or
to discuss a specific matter



Popular Articles

10 Steps to Protect Your Company from Employee Based Computer Compromise


Service Specifics

Breach Scans have quick turnarounds and are favorably priced either on as as required basis or as part of a cyber assurance program.

Network Intrusions & Data Compromise

  • Incident response
  • Intruder detection
  • Malware detection
  • Threat remediation
  • Malware analysis
  • Compromise of Personally Identifiable Information (PII) or Protected Health Information (PHI)

Misappropriation of Trade Secrets

  • Identification and examination of relevant devices and media
  • Identification and determination of misappropriated data
  • Expert testimony and reporting

Unauthorized Use

  • Workplace compliance
  • Workplace productivity
  • Erroneous reporting and record keeping


  • Assertion or defense of improper activity
  • Compliance with regulatory requirements
  • Expert testimony
  • Neutral audit and verification

Typical projects involve:

  • Misappropriation of trade secrets
  • Bankruptcy
  • Government investigations
  • Whistle blower response
  • Harassment and discrimination claims
  • Family law
  • Internal audit
  • Medical malpractice
  • Network intrusion and data breach


Download the brochure