TSCM
HOME | Forensic Data & Cyber Threats | TSCM
As the use of technology in the workplace increases, organisations become increasingly at risk from information leaks and the theft of Intellectual Property. If your organisation has recently been part of large change such as acquisition or sale, bidding for a contract or suffered from a predatory takeover or a new competitor, can you be confident that no crucial company information has been leaked to an outside party?
Leaks in Intellectual Property
Leaks in Intellectual Property can occur in any number of ways, from the traditional dumpster diving and compromised employees, to the more recent techniques of social network monitoring and illicitly installed listening devices. It is all too easy for your company information to end up in the wrong hands.
If you suspect that you have been a target of Intellectual Property theft, halting the information bleed, reinforcing security and reporting compromise should be immediate priorities.
Technical Surveillance Counter-Measures (TSCM) is often the first port of call for organisations who believe themselves to be compromised. This can include bug-sweeping or counter surveillance, reviewing communications and IT security, and reassessing the physical security measures in place.
Regents’ Approach
At Regents, we strive to ensure that we fully understand your business, from the industry you work in to your own specific operations, from facilities and layouts to corporate governance and data structures. We prepare a threat and vulnerability evaluation of your business to help you allocate resources that will detect and prevent future incursions. We provide a professional evaluation of your technical security, and consider which areas of your organisation are the most vulnerable.
Where necessary, Regents can conduct a sweep for listening devices in your facilities. These sweeps can be arranged outside out of business hours to avoid the removal or eradication of evidence. The sweep will focus on vulnerable areas such as private offices, board rooms and meeting rooms, and use expert equipment to analyse radio frequencies and carry out physical inspections.
Regents provides a detailed reports of any devices found, along with recommendations of how to counter future threats.
Computer Forensics
Mobile Phone Forensics
Cyber Threats
TSCM
Document Examination
Need Professional Advice?
Our experts provide tailored solutions to uncover critical insights, resolve complex challenges, and safeguard your business integrity.
Regents Blog
The ransomware industry is thriving, not losing
The ransomware industry is thriving, not losing. The ransomware industry is thriving, not losing. The victims are private companies and organisations, facing financial extortion or the atrocious reality that their crucial data being exposed online. The ransomware...
DS Azalina Othman elected International Anti-Corruption Academy President
The International Anti-Corruption Academy (IACA), founded in Austria in 2011, acts as a global center for research and a training hub for professionals in anti-corruption agencies. The Malaysian foreign ministry announced that the unanimous election of Law and...
Eight Pointers to Stay Safe While Shopping Online
Eight Pointers to Stay Safe While Shopping Online With stay-at-home orders, MCO in Malaysia and Circuit Breaker in Singapore being imposed during 2020 and into 2021, online shopping and home delivery is at an all-time high. Figures from analysts indicate that orders...
DS Azalina Othman elected International Anti-Corruption Academy President
The International Anti-Corruption Academy (IACA), founded in Austria in 2011, acts as a global center for research and a training hub for professionals in anti-corruption agencies. The Malaysian foreign ministry announced that the unanimous election of Law and...
Procurement Fraud threats to companies
There are five basic bid rigging schemes which target vulnerable procurement tenders
More scam and cheat schemes in 2021
More scam and cheat schemes in 2021 Mobile number portingScammers transfer a registered mobile phone number from one telco provider to a different provider without the knowledge of the owner followed by syncing the scammer’s mobile phone with the ported number to...