Information Assurance: The practice of mitigating information-related risks by protecting the confidentiality, integrity, and availability of data and systems that store, process and transact this data. Insider and outsider threats pose risk to businesses which utilize information technology to conduct electronic commerce.
Computer Security: Addresses enforcement of secure behavior on the operation of computers, including the confidentiality, integrity and availability of electronic information that is processed by or stored on computer systems.
In today's world information assurance and computer security is more important than ever. The number one form of "Hacking" today is activating your computers webcam for access video and audio of your home or office. IDRC has experienced and trained analyst that will evaluate your current information system and design a comprehensive Information Assurance program for your firm.
You can find listening and covert video devices on the net, in magazines and in most electronic stores. You also have the risk of someone emailing you spy software that will give them access to your stored information as well as your webcam for real time audio and video. The threat is more extensive today than at any other time in our history.
Smart Phone Vulnerabilities: Your Smart phone is an extension of your office and or home computer. Many Smart Phones are connected to your computer network by Social media apps such as Facebook, Twitter or RSS. High percentages of users do not password protect or install anti virus and anti malware software on their handhelds. All apps should be scanned for viruses and malware before downloading. Care should be taken in public areas that users devices and data are not acquired through the blue Tooth or Wi-Fi connections. IDRC has the capability to analyze your device to detect compromise and in some cases determine who and where the attacks originated as well as protecting you in the future from attack.
Internet Security: The design of internet protocols is to quickly allow multiple computers to communicate without interruption. This design element which allows us to communicate between each other is the vulnerability that hackers exploit to attack your organization. Being designed before the onslaught of hackers the TCP/IP protocol was written with little attention being provided to security of the protocol leaving the system with many security flaws.
This security flaw makes it possible for hackers to "Spoof" an IP address. Source addresses are not used to route the destination so a hacker can forge or spoof the IP address making the computer believe they are the legitimate sender while a remote server is sending data posing as someone else.
IDRC has the ability to address the IMAP an POP issues that are exploited by hackers as well as the system configuration flaws such as default configurations not being changed, default or empty root passwords, and the system manager leaving holes in the system that are a non secure run mode.
Computer Forensics: Forensics provides you with the ability to determine what data has been utilized on a computer or mobile device, the time that the data was accessed and what files were changed. This information is invaluable in a legal or court situation to prove or disprove fact of the case. Our forensic analyst are experienced with EnCase, FTK Imager, Prefetch Analyzer, Forensic Toolkit (FTK) and others for e-discovery.
IDRC provides a full service Information Security program to address your Computer, Smart Phones, Network, IT Forensic and Telecommunications Systems.
TECHNICAL SURVEILLANCE COUNTERMEASURES (TSCM)
Download pdf documents on Choosing a TSCM Team and Who would want to Bug you below.
This year the FBI reported a 200% increase in the number of industrial espionage cases that they worked. One FBI report to Congress stated that American businesses loses are $100 Billion a year to foreign spying. He reported that FBI investigations revealed that 23 countries actively engage in economic espionage activities against the United States. Other sources testified that they knew of 51 countries targeting the United States to include several of our allies. Additional information indicates that it is not just the “Super Companies” that are targeted. Middle size to small companies are targeted four times more often, and the main reason is that they are easier to penetrate.
Private sector bugging has exploded in the last 5 years with the expansion of the internet. Individuals now have access to purchasing listening, recording and bugging equipment online that they did not have access to in the past. There are hundreds of companies selling devices that have the ability to monitor your computers, mobile devices homes and offices. IDRC has certified technicians and the professional equipment required to competently provide you with counter measure services.
Activities:
Commercial Technical Countermeasures conducted will be a radio frequency analysis, telephone analysis, telephone line analysis, carrier current analysis, and a physical search. The telephones and lines will be analyzed by performing 27 different test.
Counter measures are performed by experienced professionals using the industry excepted and certified counter measure equipment and ATAB, and ISCTP Certified Technicians.
Background
We have been performing counter-measure sweeps for over 30 years and have successfully completed over 60 government and civilian training schools for over 7,000 hours of training. Mr. Flannigan was voted Security Professional of 1998 by Counter Terrorism and Security International and has been featured on 48 hours, Street Stories and 20/20 as well as many news paper and magazine articles for his counter-measure expertise.
We have performed successful investigative services for Past Presidents, Fortune 500 companies and law firms. We have performed counter-measures internationally in Berlin, Moscow, Lima, and Hong Kong to name a few.
Our equipment is state of the art and is the recommended equipment of T.R.A. and ATAB for Counter Measure sweeps. Our Technicians hold Advanced ATAB and T.R.A certified Counter Measure Certifications and have a minimum of 6 years experience as counter measure technicians.
If you would like a power point on Information Security or On Smartphone Security contact us.