About
Subscribe

BDO to help businesses fight cyber crime

Lauren Kate Rawlins
By Lauren Kate Rawlins, ITWeb digital and innovation contributor.
Johannesburg, 23 Jun 2016
The BDO cyber and forensic lab offers analytics, forensic and digital forensic auditing.
The BDO cyber and forensic lab offers analytics, forensic and digital forensic auditing.

Auditing firm BDO has created a cyber and forensic lab, which will assist businesses to mitigate technology .

Cyber crime is on the rise and huge amounts of money are lost each year when companies are hacked, is compromised or systems infected. Despite the , BDO says most companies are not adequately prepared.

"The next war is going to be a cyber war," says Graham Croock, director of IT audit, risk and cyber lab at BDO South Africa.

For this reason, it teamed up with local security software company FIDS (Forensic Intelligence Data Solution) to create an internal cyber and forensic lab that offers clients resources, skills, forensic and legal support. FIDS uses home-developed as well as Israel technology.

The lab has been operational since March, but was officially launched to the media this week. Up to eight developers and data specialists work full-time and more people are called in depending on the number of investigations.

The software and analytics platforms used in the lab were developed by FIDS, and developers within the lab constantly work on improving the systems.

Early warning

BDO continuously monitors critical data and processes for clients in the lab. This allows for early threat detection, and ensures an organisation's data is complete, accurate, reliable and valid, says BDO.

Other investigative services include detection and exposure of corruption by providing information that would be impossible to find via manual processes.

Most companies are not adequately prepared for cyber crime, says BDO SA's Graham Croock.
Most companies are not adequately prepared for cyber crime, says BDO SA's Graham Croock.

The lab uses linkage software that wades through data provided by the client and publically available information to find often complicated links between people, assets and places.

The lab also provides digital forensic evidence in criminal or civil trial proceedings and presents the evidence as testimony in support of a client's case. This evidence can be gathered by 'hacking' into a cellphone provided by the client.

The phones the lab 'hacks' into have to be obtained legitimately and legally, and done in a manner that preserves the evidence under forensically sound conditions.

The lab serves as the link between a client who has an interest in the prosecution of a criminal case and the South African Police Services and National Prosecuting Authority.

BDO clients also use the lab during procurement reviews, restraint of trade investigations and to prove theft of intellectual property.

The full picture

During the media event, a live phone hack was demonstrated. The FBI uses the same software, Israeli-developed Cellebrite, to hack into mobile phones. It is unclear if it was the same software used in the recent FBI Apple case.

Cellebrite retrieves information, even it has been deleted or password-protected, such as SMSes, messages from all types of messaging apps, e-mails, contacts, photos and location history.

This information is combined with freely available information on social media platforms and public records, enabling the lab to map out detailed profiles of employees, companies and partnerships.

"We are open to ethical hacking whereby there is a benefit to the business and the client," says Croock.

"We are living in an age where information travels everywhere, where anyone can access anything, and where the collective intelligence of humanity drives innovation in every direction while enabling new threats.

"Adding to this, the cyber landscape today presents a relatively open and interoperable global digital infrastructure, which connects entities such as organisations, businesses, governments and individuals."

Privacy protection

All investigations and data collection is discreet, controlled, thorough and fully documented, says BDO. The lab's security system includes biometric access control, security cameras, 24/7 physical security guards, and armed response.

"The privacy of clients is paramount and BDO takes all the relevant steps to ensure all information placed in our care is treated appropriately. All contracts contain non-disclosure agreements. Data remains the property of the client and will be retained or destroyed as per instruction from the client," says Croock.

BDO says information security legislation has not kept up to speed with the changes in cyber crime.

"POPI and the suggested onerous cyber crimes Bill will be the focus areas in terms of the legislation for cyber crime. But even then, it is almost impossible to police and the government is trying to place the onus on the public for self-policing, with stiff fines and jail time for non-compliance," says Croock.

Share