Computer Forensics
HOME | Forensic Data & Cyber Threats | Computer Forensics
Regents Risk Advisory is a leading risk consulting companies, specialising in corporate investigations. We provide a broad range of intelligence and analytical information services, helping clients address and mitigate risk and protect business assets.
Regents operate a multi-disciplinary approach to developing business critical intelligence, combining investigative experience with a deep understanding of the business environment. We draw on a wealth of specialised knowledge, from former senior law enforcement officials to accountants, anti-corruption investigators and intelligence analysts.
In today’s business environment, more than eighty percent of company data is stored electronically on computers, servers and handheld devices, with most paper records also likely to have originated from a computer system. The collection and analysis of electronic evidence can be integral to supporting fraud investigations and allegations of systematic theft or resolving other threats to corporate integrity. Regents can help clients access, identify, isolate and analyse data contained on their servers, computers and mobile phones, to ensure a complete and accurate evidence base can be obtained.
The gathering of digital evidence can include accessing current, amended or deleted information such as emails, documents, images or spread sheets, as well as ascertaining when and where documents were changed, or emails sent. Such evidence can trap a fraudster, or unmask an errant employee sending fake emails.
Computer Forensics
Mobile Phone Forensics
Cyber Threats
TSCM
Document Examination
Need Professional Advice?
Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module
Regents Blog
Better password protection by `Naked Password’
Most people are lazy when it comes to using computers properly. People are even lazier when to comes to selecting a password for accessing their computer or web service. Computer security seems to be a keyboard type too far. The more complex a password is by...
Mobile phone hacking scandal rumbles on
It is four years since the phone-hacking scandal at the News of the World newspaper [the leading UK Sunday newspaper] saw the newspaper’s former royal correspondent, Clive Goodman, jailed for his part in hacking into the mobile phone voicemails of Princes William...
Vodafone Australia hit by Privacy Breach
VODAFONE Australia launched an internal investigation into a security breach that has put invoicing and call records on a publicly accessible website protected only by passwords that are changed monthly. Allegedly, anyone with a Vodafone login could view sensitive...
Is Speak Asia Online to be trusted?
Despite being the home of software programmers and large scale IT out-sourcing companies, the Indian public has not been exposed to internet sensations, rumours and intrigue to the same extent as countries such as the USA. Until now. The online opinion company Speak...
Skimming cash frauds
Skimming is the term given to the type of fraud whereby cash from a customer is diverted before it enters the victim company. Embezzlement is the more technical term given to this practice and it is also known as an `off-book fraud’. Detecting and proving a skimming...
Gift card vouchers and the link
to money laundering
Gift card vouchers can be the perfect solution for a birthday when you’re not sure which present to buy. Simply pay cash at the store or shopping mall and transfer the same value onto the voucher to be used at the designated outlets. Travellers Cheques have been...