Forensic Data & Cyber Threats
HOME | Forensic Data & Cyber Threats
Regents operate a multidisciplinary approach to developing business-critical intelligence, combining investigative experience with a deep understanding of the business environment. We draw on a wealth of specialized knowledge, from former senior law enforcement officials to accountants, anti-corruption investigators, and intelligence analysts.
In today’s business environment, more than eighty percent of company data is stored electronically on computers, servers and handheld devices, with most paper records also likely to have originated from a computer system. The collection and analysis of electronic evidence can be integral to supporting fraud investigations and allegations of systematic theft or resolving other threats to corporate integrity.
Regents can help clients access, identify, isolate and analyse data contained on their servers, computers and mobile phones, to ensure a complete and accurate evidence base can be obtained.
The gathering of digital evidence can include accessing current, amended or deleted information such as emails, documents, images or spread sheets, as well as ascertaining when and where documents were changed, or emails sent. Such evidence can trap a fraudster, or unmask an errant employee sending fake emails.
Computer Forensics
Mobile Phone Forensics
Cyber Threats
TSCM
Document Examination
Need Professional Advice?
Our experts provide tailored solutions to uncover critical insights, resolve complex challenges, and safeguard your business integrity.
Regents Blog
Ransomware attacks surge in Malaysia
Ransomware has become a critical threat for small and medium sized businesses in Malaysia and across South East Asia due to the ease with which Bitcoin makes extracting ransoms from their victims. Ransomware is simple but toxic. Malicious software is inadvertently...
Digital photocopiers pose security threat
for identity theft
The digital photocopier being used in your home or office may offer an identity thief or fraudster gateway direct to your personal or sensitive data. Though most users are unaware, nearly all digital copiers sold since 2002 contain a digital hard drive — similar to...
Mobile phone hacking scandal rumbles on
It is four years since the phone-hacking scandal at the News of the World newspaper [the leading UK Sunday newspaper] saw the newspaper’s former royal correspondent, Clive Goodman, jailed for his part in hacking into the mobile phone voicemails of Princes William...
DS Azalina Othman elected International Anti-Corruption Academy President
The International Anti-Corruption Academy (IACA), founded in Austria in 2011, acts as a global center for research and a training hub for professionals in anti-corruption agencies. The Malaysian foreign ministry announced that the unanimous election of Law and...
Procurement Fraud threats to companies
There are five basic bid rigging schemes which target vulnerable procurement tenders
More scam and cheat schemes in 2021
More scam and cheat schemes in 2021 Mobile number portingScammers transfer a registered mobile phone number from one telco provider to a different provider without the knowledge of the owner followed by syncing the scammer’s mobile phone with the ported number to...