Forensic Data & Cyber Threats

HOME | Forensic Data & Cyber Threats
Regents operate a multidisciplinary approach to developing business-critical intelligence, combining investigative experience with a deep understanding of the business environment. We draw on a wealth of specialized knowledge, from former senior law enforcement officials to accountants, anti-corruption investigators, and intelligence analysts.
In today’s business environment, more than eighty percent of company data is stored electronically on computers, servers and handheld devices, with most paper records also likely to have originated from a computer system. The collection and analysis of electronic evidence can be integral to supporting fraud investigations and allegations of systematic theft or resolving other threats to corporate integrity.
Regents can help clients access, identify, isolate and analyse data contained on their servers, computers and mobile phones, to ensure a complete and accurate evidence base can be obtained.
The gathering of digital evidence can include accessing current, amended or deleted information such as emails, documents, images or spread sheets, as well as ascertaining when and where documents were changed, or emails sent. Such evidence can trap a fraudster, or unmask an errant employee sending fake emails.
Computer Forensics
Mobile Phone Forensics
Cyber Threats
TSCM
Document Examination
Need Professional Advice?
Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module
Regents Blog
Ransomware attacks surge in Malaysia
Ransomware has become a critical threat for small and medium sized businesses in Malaysia and across South East Asia due to the ease with which Bitcoin makes extracting ransoms from their victims. Ransomware is simple but toxic. Malicious software is inadvertently...
Digital photocopiers pose security threat
for identity theft
The digital photocopier being used in your home or office may offer an identity thief or fraudster gateway direct to your personal or sensitive data. Though most users are unaware, nearly all digital copiers sold since 2002 contain a digital hard drive — similar to...
Mobile phone hacking scandal rumbles on
It is four years since the phone-hacking scandal at the News of the World newspaper [the leading UK Sunday newspaper] saw the newspaper’s former royal correspondent, Clive Goodman, jailed for his part in hacking into the mobile phone voicemails of Princes William...
Procurement Fraud threats to companies
There are five basic bid rigging schemes which target vulnerable procurement tenders
More scam and cheat schemes in 2021
More scam and cheat schemes in 2021 Mobile number portingScammers transfer a registered mobile phone number from one telco provider to a different provider without the knowledge of the owner followed by syncing the scammer’s mobile phone with the ported number to...
Glossary of Scams in Malaysia
LHDN impersonation scamsRecent years have seen scammers boldly impersonating Lembaga Hasil Dalam Negeri Malaysia (LHDN), approaching Malaysians with offers of rebates for overpaid taxes or worse, threats of legal action for overdue tax. Impersonation scams known as...
Request a Consultation


