{"id":752,"date":"2024-01-27T13:45:42","date_gmt":"2024-01-27T13:45:42","guid":{"rendered":"https:\/\/staging.e5h.co.uk\/?page_id=752"},"modified":"2026-02-26T05:43:12","modified_gmt":"2026-02-26T05:43:12","slug":"services","status":"publish","type":"page","link":"https:\/\/icmscyber.com\/th\/services\/","title":{"rendered":"\u0e1a\u0e23\u0e34\u0e01\u0e32\u0e23"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"680\" height=\"664\" src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/01\/Computer-Forensics-1.jpg\" alt=\"Computer Forensics\" class=\"wp-image-844\" style=\"aspect-ratio:3\/4;object-fit:cover\" srcset=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/01\/Computer-Forensics-1.jpg 680w, https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/01\/Computer-Forensics-1-300x293.jpg 300w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<h2 class=\"wp-block-heading has-text-align-center\">Digital Forensic Services<\/h2>\n\n\n\n<p class=\"has-text-align-left\"><strong>ICMS Cyber Solution<\/strong> is a leading company in digital forensics and cybersecurity solutions in Asia. We provide a full range of services to help you protect your data, investigate cyber incidents, and enhance your security posture.<\/p>\n\n\n\n<p class=\"has-text-align-left\">Whether you need to recover deleted or hidden data, analyze malware, identify data theft, or respond to a data breach, we have the expertise and tools to assist you. <\/p>\n\n\n\n<p class=\"has-text-align-left\">We also offer customized training and consultancy services to help you build your skills and capabilities in digital forensics and cybersecurity. <\/p>\n\n\n\n<p class=\"has-text-align-left\">Our team consists of certified and experienced professionals who have worked with various clients across different industries and sectors. <\/p>\n\n\n\n<p class=\"has-text-align-left\">We are committed to delivering high-quality results, adhering to legal and ethical standards, and ensuring customer satisfaction. <\/p>\n\n\n\n<p><strong>Special Services for Japanese Companies: Supporting Smooth coordination with Japan Headquarters. <\/strong>We provide a one-stop service serves as a bridge between Thailand operations and Japan headquarters, offering [<strong>Total Incident Lifecycle Support<\/strong>].<\/p>\n\n\n\n<p>During on-site troubles, rapid and accurate reporting to Japan is critical to maintaining business operations. As experts with deep understanding of on-site situations, we fully support smooth coordination across borders. For more details, please refer to our <a href=\"https:\/\/icmscyber.com\/total-incident-lifecycle-support\/\" title=\"[For Japanese Companies] Total Incident Lifecycle Support\">[Total Incident Lifecycle Support]<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Contact us today to find out how we can help you solve your digital challenges.<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"680\" height=\"664\" src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/01\/Mobile-Forensics-1.png\" alt=\"Mobile Forensics\" class=\"wp-image-835\" style=\"aspect-ratio:3\/4;object-fit:cover\" srcset=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/01\/Mobile-Forensics-1.png 680w, https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/01\/Mobile-Forensics-1-300x293.png 300w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"uL3WNu\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-uL3WNu layout-boxed align-stretch\"><div class=\"guten-background-overlay\"><\/div><div class=\"guten-container guten-column-gap-no\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-Tf7s4t\"><div class=\"guten-column-wrapper\" data-id=\"Tf7s4t\">\n<h5 class=\"wp-block-gutenverse-heading guten-element guten-vw6wJm animated guten-element-hide desktop-fadeInUp\">Our Services<\/h5>\n\n\n\n<h2 class=\"wp-block-gutenverse-heading guten-element guten-eMDlzH animated guten-element-hide desktop-fadeInUp\">Digital Forensic Services<\/h2>\n\n\n\n<div class=\"guten-element gutenverse-text-editor guten-3RPwN7 animated guten-element-hide desktop-fadeInUp\"><div class=\"text-content-inner\">\n<p>We have a fully equipped forensic lab based in Bangkok Thailand. We provide a full range of services to help you protect your data and investigate cyber incidents.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"QnOY5G\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-QnOY5G animated guten-element-hide slow desktop-fadeInUp layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-no\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-a7eSIF\"><div class=\"guten-column-wrapper\" data-id=\"a7eSIF\">\n<div class=\"guten-element guten-qaePzA animated guten-element-hide desktop-fadeInUp guten-icon-box icon-position-top\"><div class=\"guten-icon-box-wrapper hover-from-left\"><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/digital-forensic-investigations\/\"><div class=\"icon-box icon-box-header\"><div class=\"icon bg-style-color\"><i class=\"gtn gtn-magnifying-glass-search-light icon-style-color\"><\/i><\/div><\/div><\/a><div class=\"icon-box icon-box-body\"><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/digital-forensic-investigations\/\"><h3 class=\"title\">Forensic Investigations<\/h3><\/a><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/digital-forensic-investigations\/\"><p class=\"icon-box-description\">We can support all stages of a forensic investigation from identification, preservation, analysis and presentation for a wide range of electronic devices through to court as an expert witness. <\/p><\/a>\n<div class=\"guten-element guten-button-wrapper guten-VRnx21\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/services\/digital-forensic-investigations\/\"><span>Read More<\/span><i class=\"fa-lg fas fa-arrow-right\"><\/i><\/a><\/div>\n<\/div><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/digital-forensic-investigations\/\"><div class=\"hover-watermark\"><i class=\"gtn gtn-magnifying-glass-search-light\"><\/i><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-k92WPv\"><div class=\"guten-column-wrapper\" data-id=\"k92WPv\">\n<div class=\"guten-element guten-GUFUgP animated guten-element-hide desktop-fadeInUp guten-icon-box icon-position-top\"><div class=\"guten-icon-box-wrapper hover-from-left\"><a class=\"\" href=\"https:\/\/icmscyber.com\/forensic-data-collection-service\/\"><div class=\"icon-box icon-box-header\"><div class=\"icon bg-style-color\"><i class=\"fas fa-database icon-style-color\"><\/i><\/div><\/div><\/a><div class=\"icon-box icon-box-body\"><a class=\"\" href=\"https:\/\/icmscyber.com\/forensic-data-collection-service\/\"><h3 class=\"title\">Forensic Data Collections<\/h3><\/a><a class=\"\" href=\"https:\/\/icmscyber.com\/forensic-data-collection-service\/\"><p class=\"icon-box-description\">We can support companies around the world that require locally based resources to perform forensic data collections.<\/p><\/a>\n<div class=\"guten-element guten-button-wrapper guten-eopNUK\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/forensic-data-collection-service\/\"><span>Read More<\/span><i class=\"fa-lg fas fa-arrow-right\"><\/i><\/a><\/div>\n<\/div><a class=\"\" href=\"https:\/\/icmscyber.com\/forensic-data-collection-service\/\"><div class=\"hover-watermark\"><i class=\"fas fa-database\"><\/i><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-ZdS1hn\"><div class=\"guten-column-wrapper\" data-id=\"ZdS1hn\">\n<div class=\"guten-element guten-W3QNwY animated guten-element-hide desktop-fadeInUp guten-icon-box icon-position-top\"><div class=\"guten-icon-box-wrapper hover-from-left\"><a class=\"\" href=\"https:\/\/icmscyber.com\/expert-witness-service\/\"><div class=\"icon-box icon-box-header\"><div class=\"icon bg-style-color\"><i class=\"gtn gtn-justice-1-light icon-style-color\"><\/i><\/div><\/div><\/a><div class=\"icon-box icon-box-body\"><a class=\"\" href=\"https:\/\/icmscyber.com\/expert-witness-service\/\"><h3 class=\"title\">Expert Witness Service<\/h3><\/a><a class=\"\" href=\"https:\/\/icmscyber.com\/expert-witness-service\/\"><p class=\"icon-box-description\">We can provide expert analysis and testimony on digital evidence for a wide range of legal cases in either Thai or English language.<br><\/p><\/a>\n<div class=\"guten-element guten-button-wrapper guten-rIKS2n\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/expert-witness-service\/\"><span>Read More<\/span><i class=\"fa-lg fas fa-arrow-right\"><\/i><\/a><\/div>\n<\/div><a class=\"\" href=\"https:\/\/icmscyber.com\/expert-witness-service\/\"><div class=\"hover-watermark\"><i class=\"gtn gtn-justice-1-light\"><\/i><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"h4xjcB\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-h4xjcB animated guten-element-hide slow desktop-fadeInUp layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-no\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-mnVy7u\"><div class=\"guten-column-wrapper\" data-id=\"mnVy7u\">\n<div class=\"guten-element guten-BJ2I96 animated guten-element-hide desktop-fadeInUp guten-icon-box icon-position-top\"><div class=\"guten-icon-box-wrapper hover-from-left\"><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/mobile_forensics\/\"><div class=\"icon-box icon-box-header\"><div class=\"icon bg-style-color\"><i class=\"fas fa-mobile-alt icon-style-color\"><\/i><\/div><\/div><\/a><div class=\"icon-box icon-box-body\"><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/mobile_forensics\/\"><h3 class=\"title\">Mobile Phone Data Extractions<\/h3><\/a><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/mobile_forensics\/\"><p class=\"icon-box-description\">We are equipped with the latest state of the art  mobile forensic equipment &#038; a team experienced in mobile extractions<\/p><\/a>\n<div class=\"guten-element guten-button-wrapper guten-19j2el\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/services\/mobile_forensics\/\"><span>Read More<\/span><i class=\"fa-lg fas fa-arrow-right\"><\/i><\/a><\/div>\n<\/div><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/mobile_forensics\/\"><div class=\"hover-watermark\"><i class=\"fas fa-mobile-alt\"><\/i><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-F2lzo5\"><div class=\"guten-column-wrapper\" data-id=\"F2lzo5\">\n<div class=\"guten-element guten-KlYKGj animated guten-element-hide desktop-fadeInUp guten-icon-box icon-position-top\"><div class=\"guten-icon-box-wrapper hover-from-left\"><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/ransomware-attacks\/\"><div class=\"icon-box icon-box-header\"><div class=\"icon bg-style-color\"><i class=\"fas fa-shield-virus icon-style-color\"><\/i><\/div><\/div><\/a><div class=\"icon-box icon-box-body\"><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/ransomware-attacks\/\"><h3 class=\"title\">Ransomware Attacks<\/h3><\/a><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/ransomware-attacks\/\"><p class=\"icon-box-description\">We can perform log file analysis,  uncover the attack&#8217;s entry point, build a timeline of events and help identify possible evidence of data exfiltration. <\/p><\/a>\n<div class=\"guten-element guten-button-wrapper guten-fyEnWX\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/services\/ransomware-attacks\/\"><span>Read More<\/span><i class=\"fa-lg fas fa-arrow-right\"><\/i><\/a><\/div>\n<\/div><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/ransomware-attacks\/\"><div class=\"hover-watermark\"><i class=\"fas fa-virus\"><\/i><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-yieQIZ\"><div class=\"guten-column-wrapper\" data-id=\"yieQIZ\">\n<div class=\"guten-element guten-TUDVTe animated guten-element-hide desktop-fadeInUp guten-icon-box icon-position-top\"><div class=\"guten-icon-box-wrapper hover-from-left\"><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/data-breaches\/\"><div class=\"icon-box icon-box-header\"><div class=\"icon bg-style-color\"><i class=\"fas fa-server icon-style-color\"><\/i><\/div><\/div><\/a><div class=\"icon-box icon-box-body\"><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/data-breaches\/\"><h3 class=\"title\">Data Breaches<\/h3><\/a><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/data-breaches\/\"><p class=\"icon-box-description\">We can help identify what data has been stolen or compromised, when the breach occurred and how the breach occurred. <\/p><\/a>\n<div class=\"guten-element guten-button-wrapper guten-xW0PuW\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/services\/data-breaches\/\"><span>Read More<\/span><i class=\"fa-lg fas fa-arrow-right\"><\/i><\/a><\/div>\n<\/div><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/data-breaches\/\"><div class=\"hover-watermark\"><i class=\"fas fa-server\"><\/i><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"ve8OHB\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-ve8OHB animated guten-element-hide slow desktop-fadeInUp layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-no\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-ti1CZe\"><div class=\"guten-column-wrapper\" data-id=\"ti1CZe\">\n<div class=\"guten-element guten-skJjkP animated guten-element-hide desktop-fadeInUp guten-icon-box icon-position-top\"><div class=\"guten-icon-box-wrapper hover-from-left\"><a class=\"\" href=\"https:\/\/icmscyber.com\/internal-fraud-investigations\/\"><div class=\"icon-box icon-box-header\"><div class=\"icon bg-style-color\"><i class=\"gtn gtn-finance-book-light icon-style-color\"><\/i><\/div><\/div><\/a><div class=\"icon-box icon-box-body\"><a class=\"\" href=\"https:\/\/icmscyber.com\/internal-fraud-investigations\/\"><h3 class=\"title\">Internal Frauds<\/h3><\/a><a class=\"\" href=\"https:\/\/icmscyber.com\/internal-fraud-investigations\/\"><p class=\"icon-box-description\">We can help identify who is involved, the extent of the fraud, how long the fraud has been ongoing and how the fraud was perpetrated. <\/p><\/a>\n<div class=\"guten-element guten-button-wrapper guten-fEIk3k\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/internal-fraud-investigations\/\"><span>Read More<\/span><i class=\"fa-lg fas fa-arrow-right\"><\/i><\/a><\/div>\n<\/div><a class=\"\" href=\"https:\/\/icmscyber.com\/internal-fraud-investigations\/\"><div class=\"hover-watermark\"><i class=\"gtn gtn-finance-book-light\"><\/i><\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"guten-element guten-hXjWpm animated guten-element-hide desktop-fadeInUp guten-icon-box icon-position-top\"><div class=\"guten-icon-box-wrapper hover-from-left\"><a class=\"\" href=\"https:\/\/icmscyber.com\/threattrace360\/\"><div class=\"icon-box icon-box-header\"><div class=\"icon bg-style-color\"><i class=\"fas fa-network-wired icon-style-color\"><\/i><\/div><\/div><\/a><div class=\"icon-box icon-box-body\"><a class=\"\" href=\"https:\/\/icmscyber.com\/threattrace360\/\"><h3 class=\"title\">ThreatTrace360<\/h3><\/a><a class=\"\" href=\"https:\/\/icmscyber.com\/threattrace360\/\"><p class=\"icon-box-description\">Have you been a victim of a data breach or a ransomware attack? Do you want to take a preemptive approach to your cybersecurity? If so then our newest network scanning service ThreatTrace360 is the ideal solution for you. <\/p><\/a>\n<div class=\"guten-element guten-button-wrapper guten-fpk41i\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/threattrace360\/\"><span>Read More<\/span><i class=\"fa-lg fas fa-arrow-right\"><\/i><\/a><\/div>\n<\/div><a class=\"\" href=\"https:\/\/icmscyber.com\/threattrace360\/\"><div class=\"hover-watermark\"><i class=\"gtn gtn-finance-book-light\"><\/i><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-sV7te3\"><div class=\"guten-column-wrapper\" data-id=\"sV7te3\">\n<div class=\"guten-element guten-yW1Wx5 animated guten-element-hide desktop-fadeInUp guten-icon-box icon-position-top\"><div class=\"guten-icon-box-wrapper hover-from-left\"><a class=\"\" href=\"https:\/\/icmscyber.com\/internet-email-investigations\/\"><div class=\"icon-box icon-box-header\"><div class=\"icon bg-style-color\"><i class=\"fab fa-internet-explorer icon-style-color\"><\/i><\/div><\/div><\/a><div class=\"icon-box icon-box-body\"><a class=\"\" href=\"https:\/\/icmscyber.com\/internet-email-investigations\/\"><h3 class=\"title\">Internet &#038; Email <\/h3><\/a><a class=\"\" href=\"https:\/\/icmscyber.com\/internet-email-investigations\/\"><p class=\"icon-box-description\">We can perform analysis of websites  visited, Internet searches conducted, analyse emails to identify IP addresses of sender and time and date.<\/p><\/a>\n<div class=\"guten-element guten-button-wrapper guten-gQ3xgp\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/internet-email-investigations\/\"><span>Read More<\/span><i class=\"fa-lg fas fa-arrow-right\"><\/i><\/a><\/div>\n<\/div><a class=\"\" href=\"https:\/\/icmscyber.com\/internet-email-investigations\/\"><div class=\"hover-watermark\"><i class=\"fab fa-internet-explorer\"><\/i><\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"guten-element guten-5zcsBE animated guten-element-hide desktop-fadeInUp guten-icon-box icon-position-top\"><div class=\"guten-icon-box-wrapper hover-from-left\"><a class=\"\" href=\"https:\/\/icmscyber.com\/total-incident-lifecycle-support\/\"><div class=\"icon-box icon-box-header\"><div class=\"icon bg-style-color\"><i class=\"gtn gtn-Circle-progress-light icon-style-color\"><\/i><\/div><\/div><\/a><div class=\"icon-box icon-box-body\"><a class=\"\" href=\"https:\/\/icmscyber.com\/total-incident-lifecycle-support\/\"><h3 class=\"title\">Total Incident Lifecycle Support <\/h3><\/a><a class=\"\" href=\"https:\/\/icmscyber.com\/total-incident-lifecycle-support\/\"><p class=\"icon-box-description\">[For Japanese Company]<br>-Seamless support across Japan and Southeast Asia<\/p><\/a>\n<div class=\"guten-element guten-button-wrapper guten-EHh2MX\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/total-incident-lifecycle-support\/\"><span>Read More<\/span><i class=\"fa-lg fas fa-arrow-right\"><\/i><\/a><\/div>\n<\/div><a class=\"\" href=\"https:\/\/icmscyber.com\/total-incident-lifecycle-support\/\"><div class=\"hover-watermark\"><i class=\"gtn gtn-Circle-progress-light\"><\/i><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-Mh5pEi\"><div class=\"guten-column-wrapper\" data-id=\"Mh5pEi\">\n<div class=\"guten-element guten-kfuTKL animated guten-element-hide desktop-fadeInUp guten-icon-box icon-position-top\"><div class=\"guten-icon-box-wrapper hover-from-left\"><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/cloud-forensics\/\"><div class=\"icon-box icon-box-header\"><div class=\"icon bg-style-color\"><i class=\"gtn gtn-cloud-download-alt-solid icon-style-color\"><\/i><\/div><\/div><\/a><div class=\"icon-box icon-box-body\"><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/cloud-forensics\/\"><h3 class=\"title\">Cloud Forensics<\/h3><\/a><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/cloud-forensics\/\"><p class=\"icon-box-description\">We can support the forensic collection and analysis of data from online sources such as Google accounts, Office 365 and live drive<\/p><\/a>\n<div class=\"guten-element guten-button-wrapper guten-f6GABR\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/services\/cloud-forensics\/\"><span>Read More<\/span><i class=\"fa-lg fas fa-arrow-right\"><\/i><\/a><\/div>\n<\/div><a class=\"\" href=\"https:\/\/icmscyber.com\/services\/cloud-forensics\/\"><div class=\"hover-watermark\"><i class=\"gtn gtn-cloud-download-alt-solid\"><\/i><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"8yVjWg\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-8yVjWg layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-bb2Sba\"><div class=\"guten-column-wrapper\" data-id=\"bb2Sba\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-oplTg0\"><div class=\"guten-column-wrapper\" data-id=\"oplTg0\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-fPfaal\"><div class=\"guten-column-wrapper\" data-id=\"fPfaal\"><\/div><\/div>\n<\/div><\/section><\/div>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital Forensic Services ICMS Cyber Solution is a leading company in digital forensics and cybersecurity solutions in Asia. We provide a full range of services to help you protect your data, investigate cyber incidents, and enhance your security posture. Whether you need to recover deleted or hidden data, analyze malware, identify data theft, or respond to a data breach, we have the expertise and tools to assist you. We also offer customized training and consultancy services to help you build your skills and capabilities in digital forensics and cybersecurity. Our team consists of certified and experienced professionals who have worked<\/p>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-752","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/icmscyber.com\/th\/wp-json\/wp\/v2\/pages\/752","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icmscyber.com\/th\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/icmscyber.com\/th\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/icmscyber.com\/th\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/icmscyber.com\/th\/wp-json\/wp\/v2\/comments?post=752"}],"version-history":[{"count":15,"href":"https:\/\/icmscyber.com\/th\/wp-json\/wp\/v2\/pages\/752\/revisions"}],"predecessor-version":[{"id":2482,"href":"https:\/\/icmscyber.com\/th\/wp-json\/wp\/v2\/pages\/752\/revisions\/2482"}],"wp:attachment":[{"href":"https:\/\/icmscyber.com\/th\/wp-json\/wp\/v2\/media?parent=752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}