TSCM
HOME | Forensic Data & Cyber Threats | TSCM
As the use of technology in the workplace increases, organisations become increasingly at risk from information leaks and the theft of Intellectual Property. If your organisation has recently been part of large change such as acquisition or sale, bidding for a contract or suffered from a predatory takeover or a new competitor, can you be confident that no crucial company information has been leaked to an outside party?
Leaks in Intellectual Property
Leaks in Intellectual Property can occur in any number of ways, from the traditional dumpster diving and compromised employees, to the more recent techniques of social network monitoring and illicitly installed listening devices. It is all too easy for your company information to end up in the wrong hands.
If you suspect that you have been a target of Intellectual Property theft, halting the information bleed, reinforcing security and reporting compromise should be immediate priorities.
Technical Surveillance Counter-Measures (TSCM) is often the first port of call for organisations who believe themselves to be compromised. This can include bug-sweeping or counter surveillance, reviewing communications and IT security, and reassessing the physical security measures in place.
Regents’ Approach
At Regents, we strive to ensure that we fully understand your business, from the industry you work in to your own specific operations, from facilities and layouts to corporate governance and data structures. We prepare a threat and vulnerability evaluation of your business to help you allocate resources that will detect and prevent future incursions. We provide a professional evaluation of your technical security, and consider which areas of your organisation are the most vulnerable.
Where necessary, Regents can conduct a sweep for listening devices in your facilities. These sweeps can be arranged outside out of business hours to avoid the removal or eradication of evidence. The sweep will focus on vulnerable areas such as private offices, board rooms and meeting rooms, and use expert equipment to analyse radio frequencies and carry out physical inspections.
Regents provides a detailed reports of any devices found, along with recommendations of how to counter future threats.
Computer Forensics
Mobile Phone Forensics
Cyber Threats
TSCM
Document Examination
Need Professional Advice?
Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module
Regents Blog
Better password protection by `Naked Password’
Most people are lazy when it comes to using computers properly. People are even lazier when to comes to selecting a password for accessing their computer or web service. Computer security seems to be a keyboard type too far. The more complex a password is by...
Mobile phone hacking scandal rumbles on
It is four years since the phone-hacking scandal at the News of the World newspaper [the leading UK Sunday newspaper] saw the newspaper’s former royal correspondent, Clive Goodman, jailed for his part in hacking into the mobile phone voicemails of Princes William...
Vodafone Australia hit by Privacy Breach
VODAFONE Australia launched an internal investigation into a security breach that has put invoicing and call records on a publicly accessible website protected only by passwords that are changed monthly. Allegedly, anyone with a Vodafone login could view sensitive...
India investigates Dehli Games corruption
The new Indian sports minister has sacked the chief organiser of 2010 scandal-ridden Delhi Commonwealth Games as the coalition government suffers a string of corruption scandals and thus seeks to repair its own public image. Ajay Maken said he took the decision...
Woolworth’s buyer and coffee importer
charged over corruption
A senior Woolworths executive and an alleged co-conspirator both face criminal charges following a protracted investigation into a corruption kickback scheme operating inside Australia’s major supermarket chain. In January 2011, Bill Harvey, formerly Woolworth’s...
Indonesia has a new anti-corruption Czar
The new Indonesian anti graft czar, Busyro Muqoddas, was appointed in November 2010 for a one year period. Busyro Muqoddas has pledged to resolve difficult corruption cases that have led to some in the media claiming that the country’s fight against corruption has...