A client comes to our firm to find out whether an intern took unauthorized photos of confidential talking points in order to warn the competition. Though the suspect had a private iPhone, he backed it up to a corporate system. We use the backup to correlate unauthorized activity with corporate policy.
Karadi, Gouthum (2014). eForensics Issue 1/2014, © HAKIN9 MEDIA SP. Z O.O. SP. K. 2013
Published in eForensics Magazine:
DIGITAL FORENSICS – HOW TO DO IT – OPEN MAGAZINE – FREE DOWNLOAD