TSCM
HOME | Forensic Data & Cyber Threats | TSCM
As the use of technology in the workplace increases, organisations become increasingly at risk from information leaks and the theft of Intellectual Property. If your organisation has recently been part of large change such as acquisition or sale, bidding for a contract or suffered from a predatory takeover or a new competitor, can you be confident that no crucial company information has been leaked to an outside party?
Leaks in Intellectual Property
Leaks in Intellectual Property can occur in any number of ways, from the traditional dumpster diving and compromised employees, to the more recent techniques of social network monitoring and illicitly installed listening devices. It is all too easy for your company information to end up in the wrong hands.
If you suspect that you have been a target of Intellectual Property theft, halting the information bleed, reinforcing security and reporting compromise should be immediate priorities.
Technical Surveillance Counter-Measures (TSCM) is often the first port of call for organisations who believe themselves to be compromised. This can include bug-sweeping or counter surveillance, reviewing communications and IT security, and reassessing the physical security measures in place.
Regents’ Approach
At Regents, we strive to ensure that we fully understand your business, from the industry you work in to your own specific operations, from facilities and layouts to corporate governance and data structures. We prepare a threat and vulnerability evaluation of your business to help you allocate resources that will detect and prevent future incursions. We provide a professional evaluation of your technical security, and consider which areas of your organisation are the most vulnerable.
Where necessary, Regents can conduct a sweep for listening devices in your facilities. These sweeps can be arranged outside out of business hours to avoid the removal or eradication of evidence. The sweep will focus on vulnerable areas such as private offices, board rooms and meeting rooms, and use expert equipment to analyse radio frequencies and carry out physical inspections.
Regents provides a detailed reports of any devices found, along with recommendations of how to counter future threats.
Computer Forensics
Mobile Phone Forensics
Cyber Threats
TSCM
Document Examination
Need Professional Advice?
Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module
Regents Blog
‘Flash robs’ create new challenge to retailers
Just as Twitter, face book and other social networking sites have allowed dissidents to plot the overthrow of dictators in the Middle East, groups of criminals are utilising these tools to plan coordinated thefts from stores in the USA. `Flash mobs’ was the term given...
Hacking of White House Gmail accounts
The recent announcement by Google that a number of users Gmail accounts have been hacked into has ratchet up the debate on cyber war between China and the US. The importance of this report relates to the fact that these Gmail accounts were held and sued by senior US...
Securing smartphones data
Recent sales figures indicating that worldwide sales for smartphones will increase by 60% and top half a billion units in 2011 confirms what most people already knew; smartphones are no longer just for top executives or city hopping businesspeople. Smartphones –...
Is Speak Asia Online to be trusted?
Despite being the home of software programmers and large scale IT out-sourcing companies, the Indian public has not been exposed to internet sensations, rumours and intrigue to the same extent as countries such as the USA. Until now. The online opinion company Speak...
Skimming cash frauds
Skimming is the term given to the type of fraud whereby cash from a customer is diverted before it enters the victim company. Embezzlement is the more technical term given to this practice and it is also known as an `off-book fraud’. Detecting and proving a skimming...
Gift card vouchers and the link
to money laundering
Gift card vouchers can be the perfect solution for a birthday when you’re not sure which present to buy. Simply pay cash at the store or shopping mall and transfer the same value onto the voucher to be used at the designated outlets. Travellers Cheques have been...