Forensic Data & Cyber Threats

HOME | Forensic Data & Cyber Threats
Regents operate a multidisciplinary approach to developing business-critical intelligence, combining investigative experience with a deep understanding of the business environment. We draw on a wealth of specialized knowledge, from former senior law enforcement officials to accountants, anti-corruption investigators, and intelligence analysts.
In today’s business environment, more than eighty percent of company data is stored electronically on computers, servers and handheld devices, with most paper records also likely to have originated from a computer system. The collection and analysis of electronic evidence can be integral to supporting fraud investigations and allegations of systematic theft or resolving other threats to corporate integrity.
Regents can help clients access, identify, isolate and analyse data contained on their servers, computers and mobile phones, to ensure a complete and accurate evidence base can be obtained.
The gathering of digital evidence can include accessing current, amended or deleted information such as emails, documents, images or spread sheets, as well as ascertaining when and where documents were changed, or emails sent. Such evidence can trap a fraudster, or unmask an errant employee sending fake emails.
Computer Forensics
Mobile Phone Forensics
Cyber Threats
TSCM
Document Examination
Need Professional Advice?
Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module
Regents Blog
Digital photocopiers pose security threat
for identity theft
The digital photocopier being used in your home or office may offer an identity thief or fraudster gateway direct to your personal or sensitive data. Though most users are unaware, nearly all digital copiers sold since 2002 contain a digital hard drive — similar to...
Mobile phone hacking scandal rumbles on
It is four years since the phone-hacking scandal at the News of the World newspaper [the leading UK Sunday newspaper] saw the newspaper’s former royal correspondent, Clive Goodman, jailed for his part in hacking into the mobile phone voicemails of Princes William...
Discarding computer hard drives can be dangerous
During a computer upgrade or computer replacement, many are tempted to toss the old hard drive on the curbside, sell them on eBay or else donate them to a local school or charity group. But if the data contained on those old drives has not been properly erased before...
Business Email Compromise Scams Are On The Rise
Business Email Compromise Scams Are On The Rise There has been a surge in business email compromise (BEC) or email account compromise scams (EAC) in recent years, causing losses of Millions of Dollars every year to individuals, plus Small and Medium companies. This...
Bribery and corruption behind Football
match fixing in Malaysia
Online gambling on football matches in Asia has reached hundreds of millions of dollars each season – with the risk that those involved in making or receiving large-scale bets would seek to manipulate the results by threats or bribes of the players, managers or...
Questionable hiring practices in Asia
causes Conflict of Interest for Banks
The UK based Barclays Bank PLC has become the latest international bank to reveal that U.S. authorities are investigating some of their hiring practices in Asia – suggesting a conflict of interest. Sources indicate that Barclays Bank is alleged to have improperly...
Request a Consultation


