Computer Forensics
HOME | Forensic Data & Cyber Threats | Computer Forensics
Regents Risk Advisory is a leading risk consulting companies, specialising in corporate investigations. We provide a broad range of intelligence and analytical information services, helping clients address and mitigate risk and protect business assets.
Regents operate a multi-disciplinary approach to developing business critical intelligence, combining investigative experience with a deep understanding of the business environment. We draw on a wealth of specialised knowledge, from former senior law enforcement officials to accountants, anti-corruption investigators and intelligence analysts.
In today’s business environment, more than eighty percent of company data is stored electronically on computers, servers and handheld devices, with most paper records also likely to have originated from a computer system. The collection and analysis of electronic evidence can be integral to supporting fraud investigations and allegations of systematic theft or resolving other threats to corporate integrity. Regents can help clients access, identify, isolate and analyse data contained on their servers, computers and mobile phones, to ensure a complete and accurate evidence base can be obtained.
The gathering of digital evidence can include accessing current, amended or deleted information such as emails, documents, images or spread sheets, as well as ascertaining when and where documents were changed, or emails sent. Such evidence can trap a fraudster, or unmask an errant employee sending fake emails.
Computer Forensics
Mobile Phone Forensics
Cyber Threats
TSCM
Document Examination
Need Professional Advice?
Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module
Regents Blog
‘Flash robs’ create new challenge to retailers
Just as Twitter, face book and other social networking sites have allowed dissidents to plot the overthrow of dictators in the Middle East, groups of criminals are utilising these tools to plan coordinated thefts from stores in the USA. `Flash mobs’ was the term given...
Hacking of White House Gmail accounts
The recent announcement by Google that a number of users Gmail accounts have been hacked into has ratchet up the debate on cyber war between China and the US. The importance of this report relates to the fact that these Gmail accounts were held and sued by senior US...
Securing smartphones data
Recent sales figures indicating that worldwide sales for smartphones will increase by 60% and top half a billion units in 2011 confirms what most people already knew; smartphones are no longer just for top executives or city hopping businesspeople. Smartphones –...
Fraud audits for companies and organisations
Fraud is an ever increasing problem for companies and organisations of all sizes. According to the Certified Fraud Examiners recent survey in 2008 in the USA alone, around US$994 Billion was lost to fraudulent activity. Fraud is a different form of commercial crime,...
Air India Found Wanting
– Designing a Robust Fraud Prevention
Stelios Haji-Ioannou, founder of budget airline EasyJet once uttered the famous phrase “If you think safety is expensive, try an accident”. This was based upon his dire experience in 1991 when a tanker belonging to his father’s shipping company spilled 50,000 tonnes...
Major corruption payments to Singapore Ikea manager
A Singaporean businessman who paid an incredible SGD $2.4 million to Singapore Ikea’s food services manager over six years has pleaded guilty to 12 counts of corruption involving $761,020. Andrew Tee Fook Boon, owner of business AT35 Services, gave monthly bribes to...