Cyber Threats
HOME | Forensic Data & Cyber Threats | Cyber Threats
What Constitutes a Cyber Threat?
Cyber threats can take many forms, from the theft of personal details such as passwords and financial details, to the speed at which confidential details and news can spread online. With many employees accessing the Internet during work hours to undertake personal tasks and, most importantly to post on social networks, the risk to your organisation of sensitive information or disparaging comments being posted online increases. With many of us having access to smart phones at all times of day, this threat is only compounded and the risk to your organisation’s reputation increased.
Avoiding Cyber Assault
Having a well thought out plan in place will assist your organisation in preventing online leaks and other Cyber events from taking place. In order to protect your brand, it is important to communicate an effective Internet, Email and Social Media plan to all employees. This plan should consider all the potential threats, including the following:
• Sending of anonymous and damaging emails to employees, contractors, clients, shareholders, the media etc
• Posting of malicious or defamatory content on blogs, message boards, networking sites etc
• Creating of fake or spurious websites [e.g. http://ww.ihatetheorganisation.com]
• Posting of unauthorised photos
• Cyber stalking – using the internet to harass and intimidate individuals
When dealing with Cyber Assults, discretion is crucial. The anonymity that the Internet can afford allows users to mask their identity and as such, the culprits must remain unaware of any investigation.
Regents’ Approach
Regents can help you to put together effective policies that will assist with the prevention of Cyber Assault. If you are already victim of Cyber Threats, we are able to help you trace and identify the sources of the assault and take remedial action. Our investigations include the examination of computers, reviews of access logs, tracing of IP addresses, Internet browsing histories as well as analysis of materials such as emails and blogs.
Computer Forensics
Mobile Phone Forensics
Cyber Threats
TSCM
Document Examination
Need Professional Advice?
Contact Regents Risk Advisory today for a FREE Consultation, we can help you sort through some difficult questions. Call us at +603 6204 5785 (Malaysia) or +65 6345 5770 (Singapore).
Regents Blog
When does unauthorised access to email become hacking?
In late December 2010 in the US state of Michigan, a man has been charged by Police under anti-hacking laws intended to combat the unlawful accessing and copying of data such as Intellectual Property, personal data or financial related information. However, the man is...
Desperately seeking FaceBook
nude photos poster
The teenage girl reportedly behind the posting of naked photos of St Kilda AFL football player Nick Riewoldt on her FaceBook page remains unrepentant and un-contactable. The teenage girl is believed to have taken a number of digital photos from the laptop of a fellow...
Discarding computer hard drives can be dangerous
During a computer upgrade or computer replacement, many are tempted to toss the old hard drive on the curbside, sell them on eBay or else donate them to a local school or charity group. But if the data contained on those old drives has not been properly erased before...
Chartwell boss to plead guilty
to Ponzi fraud scheme
The man behind Australia’s largest Ponzi scheme has indicated that he will plead guilty to over forty separate charges in the Supreme Court despite earlier insisting he was innocent and would contest the charges.The flameout which became Chartwell Enterprises was...
London counter-terrorism officer
jailed for 7/7 property fraud
Counter-terrorism officer Detective constable Daren Pooley has been jailed for defrauding the U.K. London Metropolitan Police Force out of £93,000 [about US$ 146,000] via a property scam during the 7 July bombings investigation. Pooley was sentenced to three years’...
Passwords? As simple as abc 123
In 2010, typed passwords remain the principal method for logging into various accounts on the internet. Despite the critical part that passwords play in securing access to email, FaceBook or Bank accounts, many users still use unsuitable and simple passwords. The...