Cyber Security and Forensic Services
Computers, cellular communications, portable electronic devices and the networks they are connected to have fast become one of the most common targets for obtaining sensitive, private or confidential information. Every individual, business or organization now requires measures to be put in place as an essential part of their overall security posture to help protect against unauthorized access to these systems and information.
When we talk about Technical Surveillance Countermeasures (TSCM) services, it has become impossible not to think about cybersecurity while assessing both threat and risk levels. As with other forms of information left, threats can be of an internal or external nature with attacks performed either physically on-site or electronically from virtually anywhere in the world.
Much like desktop and laptop computers, portable tablet computers and cellular devices are just as susceptible to compromise via malicious software. Portable devices are taken into environments outside the normal place of business or residence where existing security systems and safeguards may be in place, facing an entire range of potential hazards. These devices often see greater use than computers and can be a major source of both personal and business information.
Cybersecurity threats and methods of compromise are evolving as quickly as the technology they are dependent upon, and professional cybersecurity services require not only the appropriate technical knowledge, but extensive multi-environment working experience and training.
Waypoint Counter Surveillance Inc. bridges the gap between TSCM and Cyber Security. Our TSCM survey/inspection services include computer hardware physical examinations, non-forensic computer, wireless network security and vulnerability analysis, 2.4 GHz and 5 GHz device detection, identification and network analysis.
Computer, tablet, and cellular phone forensics includes the preservation, identification, extraction, documentation, analysis, and presentation of data. Waypoint Counter Surveillance forensic services range from spyware/malware verification, to full data extraction services, including both existing and deleted data with documentation designed for use in a court of law.
Forensic services for computers , tablets, and cellular phones can be performed on-site at the client location or the device can be sent us for examination and returned. If a compromise (spy/malware) is identified, the malicious programs can be documented as evidence or removed from the device as required by the client.
* Computer, tablet, and cellular phone forensic services are highly specialized and are provided as a stand-alone service, and as such are billed separately from our TSCM services. Our clients have the flexibility to have these services performed as part of a counter-surveillance/technical security program or as an individual security measure.
* Contact us for more information or to discuss Cyber Security and Computer, tablet, and cellular phone forensic service requirements.