Skip to main content


Notebooks are mobile devices that establish connections in a digital environment, making them highly vulnerable.

In home offices, cafes, subways, during lunch, in cars—work processes have become flexible and mobile thanks to notebooks. However, this mobility also presents challenges for IT forensics. Especially with notebooks, the search for traces in bits and bytes is a formidable task. Mobile devices like notebooks establish connections in a digital environment—with temporary hotspot connections or local networks. This makes them vulnerable on one hand, but on the other hand, it provides IT forensics with many opportunities to trace data loss. Additionally, notebooks have high-capacity and interconnected storage options, crucial for evidence preservation and data reconstruction.

In cases of data disappearance, Tems Security’s computer forensics experts can reconstruct events through backups, email servers, location logs, or data synchronization with connected mobile devices such as smartphones, smartwatches, web services, printers, data sticks, and various other digital devices. This reconstruction provides facts in a chronological sequence for processing and analysis by the company’s management. Securing, examining, visualizing, processing, and providing digital data stored on a notebook can be immensely important for employers, especially when dealing with sensitive data or when an employee has caused damage through unlawful use—think “Bring Your Own Device” (BYOD).


A “digital footprint”—crimes and abuse cases leave many traces on computers.

What happens when it happens? For instance, if there’s been an attack on a computer system, desktop computers become crucial in evidence preservation as they serve as central storage and action devices in every company.

  • Desktop computers store, process, and send data in a networked manner.
  • They have numerous backup and storage mechanisms that can be reconstructed even after a superficial deletion of data in the system depth by combining and recombining data traces.
  • Starting from the desktop, evidence and traces can point to mobile devices such as smartphones, laptops, or tablets as instruments of the crime.
  • Connections with databases, servers, cloud, and mobile services almost always provide insight into the course of the crime.

Tems Security’s experienced computer forensics experts, in combination with data from household or company internal servers, LAN networks, charging and activity logs, backup servers, and connected or synchronized storage media, can secure evidence or recover data thought to be “lost.” Every movement in the digital space leaves digital traces. Tems Security secures and analyzes these traces, ensuring they stand as compelling evidence in court. Depending on the urgency of the issue, the sensitivity of the data, and the priority of the preservation work, evidence preservation can also be carried out at your location with our mobile forensic lab. Call us today, and we’ll be there tomorrow!