Corporate Forensic Retainers
CYFOR's Corporate Forensic Retainers are designed to identify business threats with intelligent cyber security solutions and apply remediation with court-approved digital forensic expertise.
Company data and intellectual property (IP) is often the primary factor that helps a company stand out amongst its competitors. Whether the data is trade secrets, a client database, confidential technical product information, or financial information, it is usually one of their most valuable assets, enabling a competitive edge. Unfortunately, there are numerous threats, both internal and external, that businesses face which can severely impact their data, reputation, and bottom line.
Unauthorised or illegal exfiltration, transfer or copying of confidential information from company networks, servers, or computers to a third-party location. This commonly occurs when an employee is preparing to leave a business to work for a rival, or to set up a competitive organisation.
Do you have an employee you suspect is starting to become disgruntled, we can monitor their computer usage and preserve their work before mass deletion or data theft can take place.
There has been a rise in disgruntled employees selling sensitive customer data (such as credit card details) through the Dark Web as well as details of account credentials and Personally Identifiable Information (PII) compromised by third-party threat actors that an organisation may not be aware of.
Business cyber risk is a much talked about agenda, and with good reason, as there is a myriad of company cyber threats such as malware, ransomware and phishing attacks.
CYFOR has been an established industry leader in Corporate Forensic services since 2002. This experience, combined with comprehensive Cyber Security capabilities, provides a leading edge when it comes to business data security. We provide advanced vulnerability scanning, which delivers in-depth network scanning, vulnerability assessments and covert security assessments.
Technical assessments traditionally require onsite attendance, however with our capabilities, CYFOR’s experts can connect to company networks remotely and perform a wide variety of services, including, network scans, security assessments and data collections varying in focus and depth. We can identify any internal threats that exist on your systems and determine any instances of malicious employee activity, such as data theft. Unlike traditional MSP providers, once we discover an issue, we’re in the unique position of remediating the threat and, in the required circumstances, applying court-approved digital forensics expertise, should the scenario require further investigation.
Digital Evidence Preservation – We can preserve information held on an employee’s corporate assets using advanced digital forensic technology. We can also retain all available logs relating to user activity from services such as Office 365 and CRM systems.
Uncover suspicious activity – Our experts can covertly uncover suspicious employee activity prior to their departure from your business to secure your IP and confidential information.
Vulnerability Scanning – Our bespoke offering can also double up as a Cyber Security tool to monitor both internal and external vulnerabilities. We can scan the network to ensure all risks are known and promptly remediated.
Data Storage – With secure data storage facilities, we can store data for an agreed amount of time until further analysis is requested, or until data is authorised to be deleted.
CYFOR possess advanced software capable of indexing, and then ‘trawling’ sections of the Dark Web. When targeted at a specific domain (e.g. “yourcompany.com”), a search is undertaken across areas of the dark web identified as relevant, such as ID Theft Forums.
This search can identify personal and company data, such as email addresses that may have been breached and for sale on the Dark Web, culminating in a detailed report.
CYFOR can also offer Extended Dark Web search capabilities. This allows us to perform web searches on specific data, such as stolen company information, identifying if it’s for sale online. Credit Card providers use this service to identify the details of stolen credit cards by searching for a specific sequence of numbers in the card number.
This option includes all the above services, in addition to;
After submitting an enquiry, a member of our team will be in touch with you as soon as possible
Your information will only be used to contact you, and is lawfully in accordance with the General Data Protection Regulation (GDPR) act, 2018.