Historically the Christmas and New Year period sees demand for data recovery skyrocket. Digital devices mixed with holiday celebrations usually result in thousands of instances of accidentally deleted data. As always, the biggest mistake you can make is to use the wrong tool for your task at hand. Lately, it seems there is new data recovery software being released on an almost daily basis. Sometimes free, sometimes paid, they promise to successfully retrieve your deleted data.
One thing that is almost never mentioned is that in order to do its job, this software must be installed on the very device you are trying to recover data from. Also in the majority of cases we see each week, this software almost always requires you to update your phone to the latest operating system in order to ensure its compatibility with your device. This is absolutely the worst thing you can do! These acts, unfortunately, overwrite in many cases the very data you are trying to retrieve. This is the single biggest unavoidable shortcoming when using any form of data recovery software.
At NSI, the leading digital forensic data recovery firm, we use PROPRIETARY HARDWARE to perform our forensic data recovery investigations. This is the same hardware that Government and law enforcement agencies worldwide use for their digital forensic investigations. This equipment does not install anything whatsoever on your device. The data flow is a one way connection that extracts the raw binary data from your device, leaving it intact and ready for analysis.
NSI digital forensic investigations follow a forensically sound five-stage process:
We are also able to provide an extremely detailed binary analysis. This involves painstaking analysis by a senior forensic examiner who may need to reassemble the fragmented data manually to reproduce your deleted files. This process demands a methodical approach in order to locate the scattered remnants of the original file.
To put this level of effort in perspective, imagine you are asked to assemble a 10,000 piece jigsaw puzzle where you have each piece hidden in different areas throughout your neighbourhood without the original picture to guide you. This is indicative of the level at which the data can be scattered in the binary memory of your device.
Do not take the risk of overwriting your valuable data with inferior data recovery software. And please don’t entrust your valuable data to a company that relies on it either.