We analyse IT security incidents and unusual activity in client’s network or email system. Following a proven procedure, we find out whether an attack occurred, how the client’s infrastructure was compromised, and where the attack originated. If the client has been compromised, we help to close the security holes in question, and advise on how to implement sustainable means of detection and defence against such attacks.