Loading...
Home2018-02-02T06:52:50+00:00
TSCM – Technical Surveillance Countermeasures (a.k.a. Bugsweep or debugging) is the meticulous and systematic examination of an environment suspected to be compromised by electrical eavesdropping or optical devices and includes a full physical search and assessment of key designated areas. Risk3 Electronic debugging sweeps are carried out by experienced (30+ years) and highly trained professionals using the latest technological equipment to Detect Defeat & NullifySM technical surveillance equipment and identify areas of current or potential future compromise.
Please give us a call.

Learn More >

Cyber Scan – Network Vulnerability Assessment is the methodical process of evaluating & identifying security vulnerabilities & other ambiguities in networking equipment, operating systems & software applications. By identifying Common Vulnerabilities & Exposures (CVE) The risk assessment objective is to scan, examine, scrutinise & report on the level of risk associated with any security vulnerability discovered. If you are a small business with less the 20 employees you can now book a Cyber Scan by clicking this link. More employees or have Ransomware?
Please give us a call.

 

Learn More >

Mobile Device Forensics –  Under forensically sound conditions & with full access to the device we can collect digital data preserving it in a reliable & forensically verifiable manner. Recovering text or instant messages, applications data, images & video, geolocation data, transferred or stored files, contact numbers & call times. Allowing detailed evaluation of content & substance, including key usage patterns, themes, interactions & dialogues. Providing answers to human resources, external or inside counsel, corporate security & audit departments during an internal investigation or for compliance.

 

Learn More >