Partnerships

Belkasoft
Elcomsoft
Legal & Other

Disclaimer
Cookies
Use of this website (T&Cs)    
Environmental Responsibility
Compliance
Data Privacy
Documentation

Articles
White Papers
Brochures
Press Releases
Subscribe to our Newsletter

Our Websites

Visit our sister websites
Copyright Strathclyde Forensics © 2009-2015. All Rights Reserved.
About us

Our People
Our Clients
What our Clients say
High Profile Cases
Contact us
Strathclyde Forensics website is found to be Safe by NORTON SAFE WEB Strathclyde Forensics website is found to be Safe by NORTON SAFE WEB
Strathclyde Forensics website is found to be SAFE by McAfee SECURE (Siteadvisor) Strathclyde Forensics website is found to be SAFE by McAfee SECURE (Siteadvisor)
"Absence of evidence is not
evidence of absence"
Our Blogs

Check out our Blogs
Terrorist Alerts

MI5 (UK)
Department of Homeland Security (USA)

Cyberattacks (real time)
Kaspersky
FBI Cyber Most Wanted

Home
ICTTF logo ICTTF logo
ACPO Guidelines ACPO Guidelines
Scottish Legal Aid logo Scottish Legal Aid logo
The American Society of Digital Forensics & eDiscovery The American Society of Digital Forensics & eDiscovery
Limbus Studio Limbus Studio
DFS Logo DFS Logo
Industrial Espionage
Industrial Espionage is a harsh reality of business. People working for you, outsiders, associates, service providers; anyone is a potential agent who can provide valuable information about you to your competitors. You have the need and the right to protect yourself and your business.

In 2012, the FT reported that the FBI started a campaign against industrial espionage, which costs American businesses more than $12 billion each year.
Strathclyde Forensics will provide you with a professional and discreet service, and help you examine suspected acts of industrial espionage, leaks and potential threats (internal and external).

We can help you evaluate the security of your infrastructure and run your own risk assessment. We can also provide training and technical advice to minimize any leaking of confidential information.
How can someone acquire your trade secrets?

a Steal, conceal, or carry away by fraud, artifice, or deception;
a  Copy, duplicate, sketch, draw, photograph, download, upload, alter, destroy, photocopy, replicate, transmit, deliver, send, mail, communicate, or convey; and,
a  Receive, buy, or possess a trade secret, knowing the same to have been stolen or appropriated, obtained, or converted without authorization.
How can I protect my business?

1. Recognize/identify the threat.
2. Identify and value trade secrets. 
3. Implement a definable plan for safeguarding trade secrets. 
4. Secure physical trade secrets and limit access to trade secrets
5. Provide ongoing security training to employees.
6. Develop an insider threat program.