Cyber Threats
HOME | Forensic Data & Cyber Threats | Cyber Threats
What Constitutes a Cyber Threat?
Cyber threats can take many forms, from the theft of personal details such as passwords and financial details, to the speed at which confidential details and news can spread online. With many employees accessing the Internet during work hours to undertake personal tasks and, most importantly to post on social networks, the risk to your organisation of sensitive information or disparaging comments being posted online increases. With many of us having access to smart phones at all times of day, this threat is only compounded and the risk to your organisation’s reputation increased.
Avoiding Cyber Assault
Having a well thought out plan in place will assist your organisation in preventing online leaks and other Cyber events from taking place. In order to protect your brand, it is important to communicate an effective Internet, Email and Social Media plan to all employees. This plan should consider all the potential threats, including the following:
• Sending of anonymous and damaging emails to employees, contractors, clients, shareholders, the media etc
• Posting of malicious or defamatory content on blogs, message boards, networking sites etc
• Creating of fake or spurious websites [e.g. http://ww.ihatetheorganisation.com]
• Posting of unauthorised photos
• Cyber stalking – using the internet to harass and intimidate individuals
When dealing with Cyber Assults, discretion is crucial. The anonymity that the Internet can afford allows users to mask their identity and as such, the culprits must remain unaware of any investigation.
Regents’ Approach
Regents can help you to put together effective policies that will assist with the prevention of Cyber Assault. If you are already victim of Cyber Threats, we are able to help you trace and identify the sources of the assault and take remedial action. Our investigations include the examination of computers, reviews of access logs, tracing of IP addresses, Internet browsing histories as well as analysis of materials such as emails and blogs.
Computer Forensics
Mobile Phone Forensics
Cyber Threats
TSCM
Document Examination
Need Professional Advice?
Contact Regents Risk Advisory today for a FREE Consultation, we can help you sort through some difficult questions. Call us at +603 6204 5785 (Malaysia) or +65 6345 5770 (Singapore).
Regents Blog
‘Flash robs’ create new challenge to retailers
Just as Twitter, face book and other social networking sites have allowed dissidents to plot the overthrow of dictators in the Middle East, groups of criminals are utilising these tools to plan coordinated thefts from stores in the USA. `Flash mobs’ was the term given...
Hacking of White House Gmail accounts
The recent announcement by Google that a number of users Gmail accounts have been hacked into has ratchet up the debate on cyber war between China and the US. The importance of this report relates to the fact that these Gmail accounts were held and sued by senior US...
Securing smartphones data
Recent sales figures indicating that worldwide sales for smartphones will increase by 60% and top half a billion units in 2011 confirms what most people already knew; smartphones are no longer just for top executives or city hopping businesspeople. Smartphones –...
Is Speak Asia Online to be trusted?
Despite being the home of software programmers and large scale IT out-sourcing companies, the Indian public has not been exposed to internet sensations, rumours and intrigue to the same extent as countries such as the USA. Until now. The online opinion company Speak...
Skimming cash frauds
Skimming is the term given to the type of fraud whereby cash from a customer is diverted before it enters the victim company. Embezzlement is the more technical term given to this practice and it is also known as an `off-book fraud’. Detecting and proving a skimming...
Gift card vouchers and the link
to money laundering
Gift card vouchers can be the perfect solution for a birthday when you’re not sure which present to buy. Simply pay cash at the store or shopping mall and transfer the same value onto the voucher to be used at the designated outlets. Travellers Cheques have been...