Technical Solutions
Central Alberta
Technology Solutions offers a
wide range of computer security services. Click a section below
for more detailed information:
Data Security and Integrity
How are you protecting your valuable data from hacking, theft, sabotage and damage? This is particularly
important for professional corporations such as lawyers, psychologists, and medical offices where the
protection of patient and client information is vital. Failing to properly secure patient and client
information can cause severe damage to reputation and result in civil ramifications with respect to
negligence.
We are able to conduct a complete security audit of your computing
practices and/or network and provide
you with a series of recommendations and accompanying rationale that you or you and your network
administrator can implement, or we can assist you and your network administrator with implementation.
(back to top)
Security Oriented Network Design,
Installation and Maintenance
We have extensive experience in design, installation, and maintenance of home and business network
environments including LAN, WAN, hardware, software, firewalls, routers, anti-virus, scheduled
back-ups, and pre-wiring.
(back to top)
Technological Assistance with Civil
Matters
Members of our team have been trained in the extraction, retrieval and preservation of data
for evidentiary purposes in accordance with internationally accepted standards. This includes the
retrieval of hidden and deleted files from computer hard drives utilizing certain specialized software
and procedures. We also have further training in the reproduction and presentation of that evidence
for court purposes. Additionally, team members are trained and experienced in Internet investigation
and the preservation and presentation of evidence obtained via the internet.
Computer evidence can be useful in confirming or denying alibis, dates and times of communications,
determining authors of communications including email tracing, website preservation, profiling via
open source information, tracking website visits, etc., and can be particularly useful in cases such
as divorce, wrongful dismissal, and a host of other civil applications.
(back to top)
Intranet and Internet Investigation
There are several ways that we can assist you including Internet tracing, website capture,
website monitoring, workstation monitoring and usage tracking. This can be accomplished by covert
means if required.
(back to top)
Data Recovery
Have you lost important data by accidental deletion or other means? In many instances, we can
recover your data or at least certain portions of it.
(back to top)
Corporate and Individual Computer Security Education
We offer “hands on” instruction in computer security for individuals and corporations. These include short seminars that we are developing to teach skills in the following areas:
-
Basic internet security skills
-
Encryption and cryptography
-
Internet security for parents
-
Email security
(back to top)

Policy Development
We can assist you with policy development appropriate to your corporate or business environment.
Proper policy implementation and planning can be instrumental in effectively dealing with terminations
arising from employee system abuse.
(back to top)
Website Security
We can offer solutions for the protection of critical data in a web-based environment, including
Secure Socket Layer (SSL), CGI Bin scripting, and secure access for websites.
(back to top)
Open Source Intelligence
We are able to develop individual and corporate profiling from a variety of open intelligence
sources, both private and public. |