Cyber Threats
HOME | Forensic Data & Cyber Threats | Cyber Threats
What Constitutes a Cyber Threat?
Cyber threats can take many forms, from the theft of personal details such as passwords and financial details, to the speed at which confidential details and news can spread online. With many employees accessing the Internet during work hours to undertake personal tasks and, most importantly to post on social networks, the risk to your organisation of sensitive information or disparaging comments being posted online increases. With many of us having access to smart phones at all times of day, this threat is only compounded and the risk to your organisation’s reputation increased.
Avoiding Cyber Assault
Having a well thought out plan in place will assist your organisation in preventing online leaks and other Cyber events from taking place. In order to protect your brand, it is important to communicate an effective Internet, Email and Social Media plan to all employees. This plan should consider all the potential threats, including the following:
• Sending of anonymous and damaging emails to employees, contractors, clients, shareholders, the media etc
• Posting of malicious or defamatory content on blogs, message boards, networking sites etc
• Creating of fake or spurious websites [e.g. http://ww.ihatetheorganisation.com]
• Posting of unauthorised photos
• Cyber stalking – using the internet to harass and intimidate individuals
When dealing with Cyber Assults, discretion is crucial. The anonymity that the Internet can afford allows users to mask their identity and as such, the culprits must remain unaware of any investigation.
Regents’ Approach
Regents can help you to put together effective policies that will assist with the prevention of Cyber Assault. If you are already victim of Cyber Threats, we are able to help you trace and identify the sources of the assault and take remedial action. Our investigations include the examination of computers, reviews of access logs, tracing of IP addresses, Internet browsing histories as well as analysis of materials such as emails and blogs.
Computer Forensics
Mobile Phone Forensics
Cyber Threats
TSCM
Document Examination
Need Professional Advice?
Contact Regents Risk Advisory today for a FREE Consultation, we can help you sort through some difficult questions. Call us at +603 2788 3677 (Malaysia) or +65 6345 5770 (Singapore).
Regents Blog
The ransomware industry is thriving, not losing
The ransomware industry is thriving, not losing. The ransomware industry is thriving, not losing. The victims are private companies and organisations, facing financial extortion or the atrocious reality that their crucial data being exposed online. The ransomware...
Eight Pointers to Stay Safe While Shopping Online
Eight Pointers to Stay Safe While Shopping Online With stay-at-home orders, MCO in Malaysia and Circuit Breaker in Singapore being imposed during 2020 and into 2021, online shopping and home delivery is at an all-time high. Figures from analysts indicate that orders...
Learn to recognise and identify scams, so you don’t get cheated
Learn to recognise and identify scams, so you don’t get cheated The Macau scam is fairly well known today - unwitting victims receives a phone call from an individual impersonating as an official of a significant establishment or organisation and is told that...
DS Azalina Othman elected International Anti-Corruption Academy President
The International Anti-Corruption Academy (IACA), founded in Austria in 2011, acts as a global center for research and a training hub for professionals in anti-corruption agencies. The Malaysian foreign ministry announced that the unanimous election of Law and...
Procurement Fraud threats to companies
There are five basic bid rigging schemes which target vulnerable procurement tenders
More scam and cheat schemes in 2021
More scam and cheat schemes in 2021 Mobile number portingScammers transfer a registered mobile phone number from one telco provider to a different provider without the knowledge of the owner followed by syncing the scammer’s mobile phone with the ported number to...