{"id":3635,"date":"2024-12-02T14:09:52","date_gmt":"2024-12-02T19:09:52","guid":{"rendered":"https:\/\/commissionnairesquebec.ca\/cybersecurite\/enquete-cybernetiques\/"},"modified":"2025-03-06T05:44:16","modified_gmt":"2025-03-06T10:44:16","slug":"cyber-investigations","status":"publish","type":"page","link":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/cyber-investigations\/","title":{"rendered":"Cyber Investigations"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3635\" class=\"elementor elementor-3635 elementor-843\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e2b8b2 e-con-full e-flex e-con e-parent\" data-id=\"8e2b8b2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3a5243a e-con-full e-flex e-con e-child\" data-id=\"3a5243a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f152fa8 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"f152fa8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">CYBER INVESTIGATION SERVICES\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d33aa43 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"d33aa43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCyberattacks, online fraud, and data breaches have become daily threats to businesses and organizations. At <strong>Commissionnaires du Qu\u00e9bec<\/strong>, our cyber investigation service is designed to identify, analyze, and neutralize these threats before they cause irreversible damage.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae13e51 elementor-widget elementor-widget-heading\" data-id=\"ae13e51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">LEARN MORE<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-145934d animated-slow elementor-view-default elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"145934d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;flash&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"#1\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-long-arrow-alt-down\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M168 345.941V44c0-6.627-5.373-12-12-12h-56c-6.627 0-12 5.373-12 12v301.941H41.941c-21.382 0-32.09 25.851-16.971 40.971l86.059 86.059c9.373 9.373 24.569 9.373 33.941 0l86.059-86.059c15.119-15.119 4.411-40.971-16.971-40.971H168z\"><\/path><\/svg>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-390a310 e-con-full e-flex e-con e-child\" data-id=\"390a310\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-adb81aa e-flex e-con-boxed e-con e-parent\" data-id=\"adb81aa\" data-element_type=\"container\" data-e-type=\"container\" id=\"1\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6c0fc93 e-con-full e-flex e-con e-child\" data-id=\"6c0fc93\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8686ec8 elementor-widget elementor-widget-heading\" data-id=\"8686ec8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is a cyber investigation?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6699a7 elementor-widget elementor-widget-button\" data-id=\"d6699a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#contact\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a53895e e-con-full e-flex e-con e-child\" data-id=\"a53895e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a824e1b elementor-widget elementor-widget-text-editor\" data-id=\"a824e1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unlike <a href=\"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/forensic-analysis\/\">forensic analysis<\/a>, which takes place after an incident to collect and preserve evidence, cyber investigations focus on:<\/p><ul><li><strong>Detecting digital threats<\/strong>: Identifying suspicious activities on your networks and systems in real time.<\/li><li><strong>Analyzing emerging risks<\/strong>: Assessing vulnerabilities that could be exploited by malicious actors.<\/li><li><strong>Targeted response to cyberattacks<\/strong>: Developing strategies to contain and neutralize threats.<\/li><\/ul><p>This service is designed for businesses seeking to understand and mitigate their exposure to digital risks before a major incident occurs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e20903d e-flex e-con-boxed e-con e-parent\" data-id=\"e20903d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d938651 elementor-widget elementor-widget-heading\" data-id=\"d938651\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Cyber Investigation Services\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9adac1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a9adac1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6213d50 e-flex e-con-boxed e-con e-parent\" data-id=\"6213d50\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-702aa6e e-con-full e-flex e-con e-child\" data-id=\"702aa6e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5cc8b89 elementor-widget elementor-widget-text-editor\" data-id=\"5cc8b89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>1. Proactive Threat Monitoring<\/strong>  \n\nUsing advanced monitoring tools, we continuously oversee your systems in real time to detect, identify, and neutralize digital threats before they cause damage.  \n<ul>\n    <li>Detection of unusual or suspicious activities on your networks.<\/li>\n    <li>Rapid identification of ongoing or imminent cyberattacks.<\/li>\n    <li>Immediate alerting and implementation of countermeasures to mitigate impacts.<\/li>\n<\/ul>  \n\n<strong>2. Cyber Risk Assessment<\/strong>  \n\nWe conduct a thorough analysis to evaluate vulnerabilities in your infrastructure and develop a tailored defense plan adapted to your organization&#8217;s specific needs.  \n<ul>\n    <li>Comprehensive audit to identify potential security gaps.<\/li>\n    <li>Detailed analysis of applications, software, and network protocols.<\/li>\n    <li>Actionable recommendations to strengthen your cybersecurity posture.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-259db01 e-con-full e-flex e-con e-child\" data-id=\"259db01\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6481232 elementor-widget elementor-widget-text-editor\" data-id=\"6481232\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>3. Threat Hunting<\/strong>  \n\nOur experts actively track hidden threats within your systems using advanced techniques and cybercriminal intelligence databases to ensure optimal protection.  \n<ul>\n    <li>In-depth investigation to identify latent intrusions.<\/li>\n    <li>Analysis of malicious behaviors within your digital environment.<\/li>\n    <li>Targeted neutralization of identified threats to safeguard your assets.<\/li>\n<\/ul>  \n\n<strong>4. Cyber Fraud and Data Breach Investigations<\/strong>  \n\nWe assist businesses that have fallen victim to online fraud, phishing, or data leaks by identifying the sources of incidents and mitigating their impact through tailored solutions.  \n<ul>\n    <li>Analysis of suspicious emails, fraudulent transactions, and abnormal activities.<\/li>\n    <li>Thorough investigation into data breaches and their origins.<\/li>\n    <li>Detailed, actionable reports for legal or corrective measures.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6db350e e-flex e-con-boxed e-con e-parent\" data-id=\"6db350e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6d2b3ac e-con-full e-flex e-con e-child\" data-id=\"6d2b3ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c156e7 elementor-widget elementor-widget-text-editor\" data-id=\"3c156e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol>\n    <li><strong>Certified Expertise:<\/strong> Our experts are trained in the latest investigative techniques and use industry-leading tools such as Splunk, CrowdStrike, and SentinelOne.<\/li>\n    <li><strong>Responsive and Confidential Service:<\/strong> We understand the urgency of digital threats. Our team is available to respond quickly to your needs while ensuring complete discretion.<\/li>\n    <li><strong>A Preventive and Corrective Approach:<\/strong> Our investigations go beyond reacting to incidents; they also aim to anticipate future attacks by strengthening your defenses.<\/li>\n    <li><strong>Tailored Solutions for All Businesses:<\/strong> Whether you are an SME or a large organization, we customize our strategies to protect your digital assets with precision and efficiency.<\/li>\n<\/ol>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ae14b7f e-con-full e-flex e-con e-child\" data-id=\"ae14b7f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d467e28 elementor-widget elementor-widget-heading\" data-id=\"d467e28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Choose Commissionnaires <br> for Your Cyber Investigations?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5173b25 elementor-widget elementor-widget-button\" data-id=\"5173b25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#contact\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d017c26 e-flex e-con-boxed e-con e-parent\" data-id=\"d017c26\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8a83a67 e-con-full e-flex e-con e-child\" data-id=\"8a83a67\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcad4b0 elementor-widget elementor-widget-image\" data-id=\"dcad4b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/GCIH.png\" class=\"attachment-large size-large wp-image-1481\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/GCIH.png 600w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/GCIH-300x300.png 300w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/GCIH-150x150.png 150w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/GCIH-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e5d94b6 e-con-full e-flex e-con e-child\" data-id=\"e5d94b6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4283c0f elementor-widget elementor-widget-image\" data-id=\"4283c0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-1.png\" class=\"attachment-large size-large wp-image-1479\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-1.png 600w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-1-300x300.png 300w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-1-150x150.png 150w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-1-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9483fa6 e-con-full e-flex e-con e-child\" data-id=\"9483fa6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ad0fdf elementor-widget elementor-widget-image\" data-id=\"2ad0fdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image.png\" class=\"attachment-large size-large wp-image-1483\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image.png 600w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-300x300.png 300w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-150x150.png 150w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9d66264 e-con-full e-flex e-con e-child\" data-id=\"9d66264\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d3b206c elementor-widget elementor-widget-image\" data-id=\"d3b206c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/03\/Certification_ISO_27001.webp\" class=\"attachment-full size-full wp-image-4882\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/03\/Certification_ISO_27001.webp 600w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/03\/Certification_ISO_27001-300x300.webp 300w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/03\/Certification_ISO_27001-150x150.webp 150w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/03\/Certification_ISO_27001-100x100.webp 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e3dc8b5 e-con-full e-flex e-con e-child\" data-id=\"e3dc8b5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ff01299 elementor-widget elementor-widget-image\" data-id=\"ff01299\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-12-1.png\" class=\"attachment-large size-large wp-image-1485\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-12-1.png 600w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-12-1-300x300.png 300w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-12-1-150x150.png 150w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-12-1-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3023dc5 e-con-full e-flex e-con e-child\" data-id=\"3023dc5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c6b338 elementor-widget elementor-widget-image\" data-id=\"0c6b338\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"406\" height=\"341\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-13.png\" class=\"attachment-large size-large wp-image-1487\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-13.png 406w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-13-300x252.png 300w\" sizes=\"(max-width: 406px) 100vw, 406px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-71ffb89 e-con-full e-flex e-con e-child\" data-id=\"71ffb89\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-351c589 elementor-widget elementor-widget-image\" data-id=\"351c589\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"429\" height=\"358\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-1552.png\" class=\"attachment-large size-large wp-image-1489\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-1552.png 429w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-1552-300x250.png 300w\" sizes=\"(max-width: 429px) 100vw, 429px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9f4f7cd e-flex e-con-boxed e-con e-parent\" data-id=\"9f4f7cd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4d1a9f4 e-con-full e-flex e-con e-child\" data-id=\"4d1a9f4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79b5695 elementor-widget elementor-widget-heading\" data-id=\"79b5695\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Contact Our Cyber Investigators\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86b7736 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"86b7736\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e64134 e-flex e-con-boxed e-con e-parent\" data-id=\"6e64134\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a664287 e-con-full e-flex e-con e-child\" data-id=\"a664287\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7483297 elementor-widget elementor-widget-heading\" data-id=\"7483297\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">FREQUENTLY ASKED QUESTIONS<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-841e5fc elementor-widget elementor-widget-n-accordion\" data-id=\"841e5fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1380\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1380\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Do you have examples of concrete applications? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1380\" class=\"elementor-element elementor-element-8ebf075 e-con-full e-flex e-con e-child\" data-id=\"8ebf075\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1380\" class=\"elementor-element elementor-element-d99eefa e-flex e-con-boxed e-con e-child\" data-id=\"d99eefa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bbf6cbd elementor-widget elementor-widget-text-editor\" data-id=\"bbf6cbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHere are some examples:  \n<ul>\n    <li><strong>Detection of an ongoing network intrusion<\/strong>: Rapid identification of entry points and implementation of countermeasures.<\/li>\n    <li><strong>Cyber threat monitoring related to a specific event<\/strong>: For example, the launch of a new product or a sensitive marketing campaign.<\/li>\n    <li><strong>Investigation following a phishing attempt<\/strong>: Tracing the sources of attacks and identifying exploited vulnerabilities.<\/li>\n    <li><strong>Proactive ransomware protection<\/strong>: Enhanced monitoring and blocking of suspicious activities before they compromise your systems.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1381\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1381\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Who is this service for? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1381\" class=\"elementor-element elementor-element-ade3ef9 e-con-full e-flex e-con e-child\" data-id=\"ade3ef9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1381\" class=\"elementor-element elementor-element-8c28b93 e-flex e-con-boxed e-con e-child\" data-id=\"8c28b93\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6858269 elementor-widget elementor-widget-text-editor\" data-id=\"6858269\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCyber investigations are suitable for all businesses, from SMEs to large organizations, that want to reduce their exposure to cyber threats and strengthen their cybersecurity.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1382\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1382\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How long does a cyber investigation take? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1382\" class=\"elementor-element elementor-element-be9fbeb e-con-full e-flex e-con e-child\" data-id=\"be9fbeb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1382\" class=\"elementor-element elementor-element-3b0eedd e-flex e-con-boxed e-con e-child\" data-id=\"3b0eedd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c3eab9 elementor-widget elementor-widget-text-editor\" data-id=\"4c3eab9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This depends on the complexity of your infrastructure and the threat being analyzed, but our interventions typically range from a few hours to several days.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1383\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1383\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Does this service replace a gap analysis? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1383\" class=\"elementor-element elementor-element-154dbcc e-con-full e-flex e-con e-child\" data-id=\"154dbcc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1383\" class=\"elementor-element elementor-element-93eb8d9 e-flex e-con-boxed e-con e-child\" data-id=\"93eb8d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-317c7d6 elementor-widget elementor-widget-text-editor\" data-id=\"317c7d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>No, cyber investigations are a complementary service focused on the detection and immediate response to threats, whereas <a href=\"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/gap-analysis\/\">gap analysis<\/a> provides a comprehensive assessment of your security posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1384\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1384\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Do you offer long-term monitoring contracts? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1384\" class=\"elementor-element elementor-element-904cf86 e-con-full e-flex e-con e-child\" data-id=\"904cf86\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1384\" class=\"elementor-element elementor-element-7bbfb1b e-flex e-con-boxed e-con e-child\" data-id=\"7bbfb1b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd937a2 elementor-widget elementor-widget-text-editor\" data-id=\"fd937a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Yes, we offer continuous proactive monitoring services to permanently protect your systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-12d97d9 e-con-full e-flex e-con e-child\" data-id=\"12d97d9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84a7f87 elementor-widget elementor-widget-text-editor\" data-id=\"84a7f87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Protect your digital assets with our expertise in cyber investigations.<br \/>Act before it&#8217;s too late.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae4eac7 elementor-widget elementor-widget-shortcode\" data-id=\"ae4eac7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f3725-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"3725\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/3635#wpcf7-f3725-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"3725\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f3725-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<label> Your Company\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"company\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"company\" \/><\/span>\n<\/label>\n\n<label> Your Name\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" autocomplete=\"name\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span>\n<\/label>\n\n<label> Your Email\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" autocomplete=\"email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span>\n<\/label>\n\n<label> Your Phone\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-text wpcf7-validates-as-tel\" autocomplete=\"tel\" aria-invalid=\"false\" value=\"\" type=\"tel\" name=\"your-phone\" \/><\/span>\n<\/label>\n\n<label> Extension Number\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone-ext\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"e.g. 123\" value=\"\" type=\"text\" name=\"your-phone-ext\" \/><\/span>\n<\/label>\n\n<label> Subject\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"your-subject\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-subject\" \/><\/span>\n<\/label>\n\n<label> Your Message (optional)\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" name=\"your-message\"><\/textarea><\/span>\n<\/label>\n\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner cdqc-submit-transparent-dark\" type=\"submit\" value=\"Send\" \/><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CYBER INVESTIGATION SERVICES Cyberattacks, online fraud, and data breaches have become daily threats to businesses and organizations. At Commissionnaires du Qu\u00e9bec, our cyber investigation service is designed to identify, analyze, and neutralize these threats before they cause irreversible damage. LEARN MORE What is a cyber investigation? Contact Us Now Unlike forensic analysis, which takes place after an incident to collect and preserve evidence, cyber investigations [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":3632,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-3635","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Investigations - Commissionnaires du Qu\u00e9bec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/cyber-investigations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Investigations - Commissionnaires du Qu\u00e9bec\" \/>\n<meta property=\"og:description\" content=\"CYBER INVESTIGATION SERVICES Cyberattacks, online fraud, and data breaches have become daily threats to businesses and organizations. At Commissionnaires du Qu\u00e9bec, our cyber investigation service is designed to identify, analyze, and neutralize these threats before they cause irreversible damage. LEARN MORE What is a cyber investigation? Contact Us Now Unlike forensic analysis, which takes place after an incident to collect and preserve evidence, cyber investigations [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/cyber-investigations\/\" \/>\n<meta property=\"og:site_name\" content=\"Commissionnaires du Qu\u00e9bec\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CommissionnairesduQuebec\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-06T10:44:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/GCIH.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/cyber-investigations\\\/\",\"url\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/cyber-investigations\\\/\",\"name\":\"Cyber Investigations - Commissionnaires du Qu\u00e9bec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cdqc.mppn.ca\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/cyber-investigations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/cyber-investigations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/GCIH.png\",\"datePublished\":\"2024-12-02T19:09:52+00:00\",\"dateModified\":\"2025-03-06T10:44:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/cyber-investigations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/cyber-investigations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/cyber-investigations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/GCIH.png\",\"contentUrl\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/GCIH.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/cyber-investigations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Investigations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cdqc.mppn.ca\\\/#website\",\"url\":\"https:\\\/\\\/cdqc.mppn.ca\\\/\",\"name\":\"Commissionnaires du Qu\u00e9bec\",\"description\":\"Experts en s\u00e9curit\u00e9 et cybers\u00e9curit\u00e9 | Humains. Biens. Informations.\",\"publisher\":{\"@id\":\"https:\\\/\\\/cdqc.mppn.ca\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cdqc.mppn.ca\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cdqc.mppn.ca\\\/#organization\",\"name\":\"Commissionnaires du Qu\u00e9bec\",\"url\":\"https:\\\/\\\/cdqc.mppn.ca\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cdqc.mppn.ca\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo-100-ans-commissionnaires-quebec-b-o.svg\",\"contentUrl\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo-100-ans-commissionnaires-quebec-b-o.svg\",\"caption\":\"Commissionnaires du Qu\u00e9bec\"},\"image\":{\"@id\":\"https:\\\/\\\/cdqc.mppn.ca\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CommissionnairesduQuebec\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/2028146\",\"https:\\\/\\\/www.instagram.com\\\/commissionnairesqc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@commissionnairesduquebec\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Investigations - Commissionnaires du Qu\u00e9bec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/cyber-investigations\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Investigations - Commissionnaires du Qu\u00e9bec","og_description":"CYBER INVESTIGATION SERVICES Cyberattacks, online fraud, and data breaches have become daily threats to businesses and organizations. At Commissionnaires du Qu\u00e9bec, our cyber investigation service is designed to identify, analyze, and neutralize these threats before they cause irreversible damage. LEARN MORE What is a cyber investigation? Contact Us Now Unlike forensic analysis, which takes place after an incident to collect and preserve evidence, cyber investigations [&hellip;]","og_url":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/cyber-investigations\/","og_site_name":"Commissionnaires du Qu\u00e9bec","article_publisher":"https:\/\/www.facebook.com\/CommissionnairesduQuebec","article_modified_time":"2025-03-06T10:44:16+00:00","og_image":[{"url":"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/GCIH.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/cyber-investigations\/","url":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/cyber-investigations\/","name":"Cyber Investigations - Commissionnaires du Qu\u00e9bec","isPartOf":{"@id":"https:\/\/cdqc.mppn.ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/cyber-investigations\/#primaryimage"},"image":{"@id":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/cyber-investigations\/#primaryimage"},"thumbnailUrl":"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/GCIH.png","datePublished":"2024-12-02T19:09:52+00:00","dateModified":"2025-03-06T10:44:16+00:00","breadcrumb":{"@id":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/cyber-investigations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/cyber-investigations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/cyber-investigations\/#primaryimage","url":"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/GCIH.png","contentUrl":"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/GCIH.png"},{"@type":"BreadcrumbList","@id":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/cyber-investigations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/commissionnairesquebec.ca\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurite\/"},{"@type":"ListItem","position":3,"name":"Cyber Investigations"}]},{"@type":"WebSite","@id":"https:\/\/cdqc.mppn.ca\/#website","url":"https:\/\/cdqc.mppn.ca\/","name":"Commissionnaires du Qu\u00e9bec","description":"Experts en s\u00e9curit\u00e9 et cybers\u00e9curit\u00e9 | Humains. Biens. Informations.","publisher":{"@id":"https:\/\/cdqc.mppn.ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cdqc.mppn.ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cdqc.mppn.ca\/#organization","name":"Commissionnaires du Qu\u00e9bec","url":"https:\/\/cdqc.mppn.ca\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cdqc.mppn.ca\/#\/schema\/logo\/image\/","url":"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/02\/logo-100-ans-commissionnaires-quebec-b-o.svg","contentUrl":"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/02\/logo-100-ans-commissionnaires-quebec-b-o.svg","caption":"Commissionnaires du Qu\u00e9bec"},"image":{"@id":"https:\/\/cdqc.mppn.ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CommissionnairesduQuebec","https:\/\/www.linkedin.com\/company\/2028146","https:\/\/www.instagram.com\/commissionnairesqc\/","https:\/\/www.youtube.com\/@commissionnairesduquebec"]}]}},"_links":{"self":[{"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/pages\/3635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/comments?post=3635"}],"version-history":[{"count":10,"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/pages\/3635\/revisions"}],"predecessor-version":[{"id":4960,"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/pages\/3635\/revisions\/4960"}],"up":[{"embeddable":true,"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/pages\/3632"}],"wp:attachment":[{"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/media?parent=3635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}