Cyber crime affects virtually every business in South Africa today. We can provide the evidence needed to detect, prove or prevent your company’s losses. Industrial espionage and the use of company resources — primarily computers but also cell phones, SMS, and PDAs — for private purposes, are often hugely detrimental to a company’s business interests, and represents one of the biggest and fastest growing areas of white-collar crime affecting all companies small and large.
Though executives may suspect the company has a problem, they have little conception of the real dangers and insufficient knowledge to tackle them head-on.
Our experts can find those needles quickly, forensically correctly and cost-effectively. Their use of internationally recognised tools and methodologies make it possible to provide tested forensic evidence of what has taken place, and the expert testimony necessary for successful court action.
Fraud takes many forms. This ranges from unauthorised discounts, providing proprietary information, supplying intellectual property to competitors, and running of an employee’s competitive private business alongside the employer’s legitimate business utilising the employer’s computer network. Virtually all companies, whether they acknowledge it or not, have serious problems with extensive private use of email, and unauthorised and unproductive hours spent surfing the web in pursuit of private interests or entertainment, including pornography.
The time to stop this menace is now. If you suspect any level of wrongdoing is taking place you should act now; the quicker you limit the damage, the lower will be your eventual cost.
Even if you are confident that your losses are trivial at the moment, making an inventory of electronic data on which to base an effective IT policy is a sensible and practical first step to limiting your company’s potential liability. By helping you to identify, acquire, restore and analyse electronic data, we return control to you.
Importantly, our wide-ranging experience of criminal investigation enables clients to have the relevant data — including compressed, encrypted and password-protected files — made available in a forensically correct, admissible format.