Blog Post

Mobile and Cloud Data are Becoming More Important

Vernon Fryer • Mar 27, 2024

Big changes are coming with new phones in 2024

Expect big changes to come with new phones in 2024 that stretch beyond the processor and camera upgrades we typically see each year. New AI-fuelled features could make phones much smarter, potentially turning them into capable personal assistants rather than pocket-sized portals to the internet.


It’s clear that smartphones will soon be getting even smarter. In the mid-2000s, mobile phones could only do a tiny fraction of the things that their modern counterparts are capable of. Now, thanks to several recent technological advancements, it looks as though there will be no shortage of new smartphone features in the future to keep us evermore attached to our little digital devices.


When you combine this emerging technology with other existing applications that can track things like blood-pressure and heart rate, it’s easy to see how smartphones could soon bring about a revolution in medical care.


There's no doubt that with the popularity of smartphones that can manage virtually every aspect of our lives, the trend in technology is to get more and more "connectivity" into smaller and smaller packages. Simultaneously, wrist watches have become a lesson in technological redundancy for many people. Ask a friend for the time of day and they're just as likely to glance at their smartphone as they are to look at an actual wrist-bound timepiece. The newest wave of smart watches aims to change all that.


Mobile devices are growing in importance and are vital to a range of investigations. So, what’s behind this growth? We can find some clues by examining the frequency with which mobile devices are used in different investigations. Phishing tops the list, well ahead of employee misconduct, which itself outpaces malware-infected endpoints, misuse of assets or policy violations, and data exfiltration or IP theft. As noted earlier, business e-mail communication is a pervasive threat, and most BEC frauds begin from the victim’s perspective with a phishing email. Similarly, many malware attacks also start with an email, which may contain a malicious attachment or link. A sizeable number of these emails will be opened on a mobile device and, with many organisations actively enabling BYOD, many devices used for such official activities are unmanaged. Compounding the risk, many unmanaged devices are jailbroken or rooted—making them more susceptible to malicious apps.


Digital investigations have really evolved over the years. Often, we’re looking at multiple pieces of evidence from not only the endpoint but also various logs, cloud, and mobile data as well. This inherently creates more complex investigations for examiners as they build incredibly detailed reports containing multiple pieces of evidence into a report for their stakeholders.


This has led to the need for mobile data collection and analysis to be improved. Mobile attacks are a growing threat, and a successful compromise can allow a threat actor to harvest credentials and sensitive information from the device itself, while also leveraging the device to access the organization’s wider IT environment.


To protect the organisation and employees, corporate digital forensic investigative professionals often need to gain access to communications and data on mobile devices, but the complexity and ever-growing diversity of mobile devices can present several challenges. A comprehensive and detailed data extraction can provide investigators with critical evidence and information, but a large group of DFI indicated that they are only able to extract limited data. For example, the inability to gain access to devices in question, and collect from devices remotely. Plus, in most corporate environments, team members will be unable or unwilling to surrender their mobile devices for an extended period. Mobile devices are becoming more important to corporate forensics.


Outsourcing investigations is considered cost effective and is often required. There are many reasons why an organisation would bring in a third-party service provider to perform or assist with DFIR activities.


The digital forensic investigation process is a complex and constantly evolving domain, but it’s never been more important for today’s organisations. The Cybercrime Act and the POPI Act have also contributed to the complexity. Digital forensics within corporate environments may originate with legal obligations and human resources issues, but the field’s future will be closely linked with cyber incident response—which itself should be a top-of-mind issue for leadership.


Viewed through this lens, a robust DFIR function—whether in-house, from a third party, or through a combination—becomes not an expense, but an investment in risk management and business continuity. Invest in a balanced DFIR portfolio that enables investigators to keep pace with ever - changing needs - Investigations for HR/internal issues and to support eDiscovery/litigation aren’t going away. At the same time, IR processes are increasingly reliant upon digital forensics to uncover data that is essential for helping the organization recover from cyberattacks, strengthen resilience, and demonstrate that reasonable safeguards were in place (i.e., to support cyber insurance claims).


Risk Diversion and our Magnet Forensic Partner claims meeting these concurrent and evolving needs requires a balanced approach that allows corporate DFIR practitioners to perform a variety of investigations and to keep pace with data extraction and analysis demands. Already, investigators collect from cloud and mobile data sources at about the same frequency as they collect from traditional computers—and there’s every indication that cloud and mobile data sources are only going to grow in importance. As data volumes soar, it’s imperative that DFIR professionals are equipped with modern tooling that can extract data—including full file system collections—from a range of sources, that makes it easy for investigators to combine sources into one coherent view. Using automated DFIR processes to manage risk increase quality and efficiency as today’s corporate DFIR professionals are under enormous pressure to conduct fast and thorough investigations. Unfortunately, the landscape in which they operate can be characterized by one word: more.


As in more investigation types, more investigations overall, and more data involved with each investigation. Automation is commonplace in the IT and security world, but it is relatively new to digital forensics. Nevertheless, automating forensics’ data extraction and transformation pipelines is already increasing the quality and efficiency of DFIR activities—and practitioners are adamant that they see tremendous value in automation investments. Strategically leveraging third-party service providers, many organisations already lean on third-party forensic service providers to assist with investigations, for a range of reasons. Security, IT, and HR leaders should work with their internal teams to determine the ideal role for FSPs and how best to leverage them.


Risk Diversion Blog

By Vernon Fryer 13 May, 2024
Exploring the complex and fascinating world of Speech Analysis
By Vernon Fryer 06 May, 2024
Digital Forensics in Aircrafts
By Vernon Fryer 29 Apr, 2024
The superhighways and byways of cyber space has enabled millions of IoT devices to be connected to the internet.
By Vernon Fryer 05 Apr, 2024
Video and photo enhancement software
By Vernon Fryer 20 Mar, 2024
Discovering the Trust in Cybercrime Investigations
By Vernon Fryer 13 Mar, 2024
Delving into the Newest Features of XRY
By Vernon Fryer 04 Mar, 2024
Exploring the Rapidly Evolving World of IoT Forensics in Motor Vehicles
By Vernon Fryer 21 Feb, 2024
Exploring the capabilities of Risk Diversion’s Vehicle Forensics Game Changing Software
By Chantel Van Niekerk 16 Apr, 2020
As the South African government has announced the extended lockdown to curtail the spread of the Corona virus (COVID-19), we would like to encourage everyone to adhere to the restrictions and guidelines set out to make our country safe. From our side, we have set-up operations so that our employees can work remotely to comply with guidelines of social distancing. During this period of off-site operations, we are confident that we will continue to provide excellent service and support that has been the hallmark of our company. While everyone is working from home that comes with a host of new challenges. It does not have to be all doom and gloom, we believe that as a society we will come out stronger after this. We would like to use this time to re-establish connections with you our clients and partners to allow us to gauge what you want from us and that you are being serviced correctly as it pertains to your forensic needs. Our products range from remapping hard drives, retrieving data from cell phones and computers, CCTV footage retrieval and much more. Feel free to contact us at delton@riskdiversion.co.za to set up an online meeting. We would like to hear what new challenges you are faced with during this time and feel confident that we can provide a solution for you.
Your child and cyberbullying
By Risk Diversion 06 Feb, 2020
Cyberbullying is fast becoming a bigger problem for young adults than drug abuse, with 20% of teenagers victimised and 51% of adolescents saying it is more vicious than face-to-face bullying.
More Posts
Share by: