Cyber Threats
HOME | Forensic Data & Cyber Threats | Cyber Threats
What Constitutes a Cyber Threat?
Cyber threats can take many forms, from the theft of personal details such as passwords and financial details, to the speed at which confidential details and news can spread online. With many employees accessing the Internet during work hours to undertake personal tasks and, most importantly to post on social networks, the risk to your organisation of sensitive information or disparaging comments being posted online increases. With many of us having access to smart phones at all times of day, this threat is only compounded and the risk to your organisation’s reputation increased.
Avoiding Cyber Assault
Having a well thought out plan in place will assist your organisation in preventing online leaks and other Cyber events from taking place. In order to protect your brand, it is important to communicate an effective Internet, Email and Social Media plan to all employees. This plan should consider all the potential threats, including the following:
• Sending of anonymous and damaging emails to employees, contractors, clients, shareholders, the media etc
• Posting of malicious or defamatory content on blogs, message boards, networking sites etc
• Creating of fake or spurious websites [e.g. http://ww.ihatetheorganisation.com]
• Posting of unauthorised photos
• Cyber stalking – using the internet to harass and intimidate individuals
When dealing with Cyber Assults, discretion is crucial. The anonymity that the Internet can afford allows users to mask their identity and as such, the culprits must remain unaware of any investigation.
Regents’ Approach
Regents can help you to put together effective policies that will assist with the prevention of Cyber Assault. If you are already victim of Cyber Threats, we are able to help you trace and identify the sources of the assault and take remedial action. Our investigations include the examination of computers, reviews of access logs, tracing of IP addresses, Internet browsing histories as well as analysis of materials such as emails and blogs.
Computer Forensics
Mobile Phone Forensics
Cyber Threats
TSCM
Document Examination
Need Professional Advice?
Contact Regents Risk Advisory today for a FREE Consultation, we can help you sort through some difficult questions. Call us at +603 6204 5785 (Malaysia) or +65 6345 5770 (Singapore).
Regents Blog
Better password protection by `Naked Password’
Most people are lazy when it comes to using computers properly. People are even lazier when to comes to selecting a password for accessing their computer or web service. Computer security seems to be a keyboard type too far. The more complex a password is by...
Mobile phone hacking scandal rumbles on
It is four years since the phone-hacking scandal at the News of the World newspaper [the leading UK Sunday newspaper] saw the newspaper’s former royal correspondent, Clive Goodman, jailed for his part in hacking into the mobile phone voicemails of Princes William...
Vodafone Australia hit by Privacy Breach
VODAFONE Australia launched an internal investigation into a security breach that has put invoicing and call records on a publicly accessible website protected only by passwords that are changed monthly. Allegedly, anyone with a Vodafone login could view sensitive...
India investigates Dehli Games corruption
The new Indian sports minister has sacked the chief organiser of 2010 scandal-ridden Delhi Commonwealth Games as the coalition government suffers a string of corruption scandals and thus seeks to repair its own public image. Ajay Maken said he took the decision...
Woolworth’s buyer and coffee importer
charged over corruption
A senior Woolworths executive and an alleged co-conspirator both face criminal charges following a protracted investigation into a corruption kickback scheme operating inside Australia’s major supermarket chain. In January 2011, Bill Harvey, formerly Woolworth’s...
Indonesia has a new anti-corruption Czar
The new Indonesian anti graft czar, Busyro Muqoddas, was appointed in November 2010 for a one year period. Busyro Muqoddas has pledged to resolve difficult corruption cases that have led to some in the media claiming that the country’s fight against corruption has...