There are two types of data in any investigation. Dynamic data is likely to disappear, either through natural processes or because someone decides to delete it. The other is information that can be easily collected.
The second type can be collected relatively easily from central systems without raising any alarm bells.
The first presents more challenges. This can require covert work so as not to raise suspicions that might lead to the data disappearing.
It can be difficult to get data from the suspect’s area of work. There are the usual devices, such as laptops and mobile phones. But there are other less obvious sources of information. These could include onsite servers, USB drives, cameras, portable games, tablets, or cloud-based storage accessed through work or other accounts.
Non-digital evidence can help crack an investigation. Often suspects have notebooks, diaries, calendars or sticky notes with their passwords that can help you access vital evidence.
Access logs can provide useful evidence of when suspects were (or weren’t) in the building at crucial periods when the fraud was perpetrated.