Combining technical and legal expertise
to deliver investigative, discovery and forensic solutions worldwide.

Some of our Features

This is where your latest Features custom posts will show up. You can change this text in the options.

View all our Features
  • Computer Forensics »

    Computer forensics is the use of scientific methodologies for collecting, analyzing, and presenting digital evidence in litigation. The challenge for forensic experts grows as organizations store data on ever-increasing numbers of devices, operating systems and shared platforms. More »

  • Cyber Security »

    Assessments are crucial in determining the effectiveness of an organization’s current security, and in judging whether correct remediation has taken place after an incident. Kivu has deep expertise in both reactive and proactive data security services. More »

  • Data Breach Response »

    In today’s environment, a data breach is the perfect storm. It destroys customer loyalty, ruins corporate reputations, absorbs employee time and scarce resources, and opens the door to regulatory actions and law suits. More »

  • Investigations »

    Fraud, theft of confidential information and employee misconduct are issues which can literally destroy an otherwise sound business. In a highly competitive environment, the risks of financial damage, reputational harm and regulatory action have never been greater. More »

From Our Blog

RSS Kivu Labs

  • Hidden data: hidden threat September 9, 2015
    Some of the worst and most costly data breaches occur because an organisation doesn’t know what and how much data they have stored, says Winston Krone Managing Director, Kivu Consulting. In many cases, businesses have simply been unaware that they hold sensitive data such as healthcare or financial information, and “…haven’t purged data, they haven’t […]
  • Five Things Hackers Don’t Want SMB’s to Know August 24, 2015
    #1. Anti-virus programs are generally ineffective #2. Your firewall faces the wrong way #3. You are the weakest link in the Cloud #4. Advising your employees not to open emails from “strangers” is counter-productive #5. Encrypting your company’s portable devices isn’t enough Many small-to-medium (SMB) sized businesses believe that they aren’t important or large enough […]

Upcoming Events