Arrow.png

Internet Investigations

Have you considered the safety of your online activities?

 

From searching 'cute pet names' to online shopping & banking, we can help you discover what information you expose online.

Our ethical hackers use the same techniques & publicly available information as malicious hackers to provide you with a report that is helpful & relevant.

This shows you your weaknesses & where improvement is needed.

Please contact us for more information.

                                                                                      Jump to:

Corporate Internet Investigation

 
light bulb.jpg

Provides you with a comprehensive review of publicly available information

  • Learn what is being said about your organisation on the internet

  • Find out what information your employees are releasing

  • Discover if there are any damaging news stories, social media posts or associations about or with your company

The investigation & report are tailored to you as a client.

As part of this, detailed objectives, concerns you may have & potential outcomes are understood & verified prior to the investigation beginning.

No interaction with any organisation or person

No intrusive measures or tools used

No social engineering techniques used

Research.jpg

This can also be used to undertake high level due diligence on another organisation, supplier or prospective partnership

  • Tailored to client brief

  • Prior to the investigation, the following are discussed & verified:​

    • objectives​

    • concerns

    • outcomes

This service provides you with a review of your online presence & associations.

Alongside this is will show you what of your personal & private information is available to view publicly.

Support pre-employment checks

Manage potential threats (e.g. to a Director or family)

Understand more about a person of interest

How Does This Relate to Criminal Hackers?

This shows what information criminal hackers can use during their early preparation stages

Shows what "gates" you're leaving unlocked

Does this by using publicly available information, internet searching & social media tools

What Do You Get at the End?

A detailed report

Citation of sources, links & associations used in the process

A threat assessment based on the initial brief

An explanation of how the information gathered might be used in an attack or any perceived threats from the organisation

Individual Internet Investigation

 

In order to create an internet profile & understand any specific risks to or threats from an individual, we assess the following:

  • Social media

  • News posts

  • Online forums

  • Public records

What Do You Get at the End?

A detailed report

Citation of sources, links & associations used in the process

A threat assessment based on the initial brief

An explanation of how the information gathered might be used in an attack or any perceived threats from the individual