FAQ

Frequently asked questions

What will CT6.® Cybercrime Prevention tell me about my data?


With CT6.® Cybercrime Prevention technology in place, one piece of data (a username, a password, an infected device) can uncover a much larger problem. This one piece of data can uncover which employees, customers, or vendors who are victims of malware or phishing campaigns on third-party networks. It can lead to the discovery of viruses, naive user behavior, weak authentication, third-party breaches, and other factors external to the network. These previously unseen vectors render a native system susceptible to attack. CT6.® Cybercrime Prevention identifies the infected devices of remote employees, customers accessing online platforms, or vendors on a network. It can determine if employees, customers, and supply chain vendors are using a username or password that was already compromised days or years ago, waiting to be discovered by a hacker. It can tell if any internal or external user was compromised by a spoofed access point for an online retailer or financial institution anywhere in the world. The ability of cybercrime prevention technology to track and map disparate data points is limitless, and it is vital to preemptively stopping cybercriminals dead in their tracks.




Cybercrime Prevention Means Uncovering the Unknowns


The edge of awareness for data owners must expand to keep pace with the intrusion capabilities of the hackers and criminals. Absolutely critical to expanding the edge of awareness is ascertaining the unknowns, such as the method, source, extent, and all affected data points from the original and any subsequent compromises. By expanding the edge of awareness for data owners and protectors through cybercrime prevention, an outer ring of armor is wrapped around operational cybersecurity measures. This fills in the missing capability by adding a powerful offense to a fortified cybersecurity defense. Full cybercrime awareness means uncovering the unknowns (e.g., method, source, extent, all affected data) that sit outside of your network to combat sophisticated cyberattacks. It means knowing what the criminal knows and what access criminals have into your employees, customers, and vendors. It is no longer good enough to simply know if a piece of data is compromised or not. Data security is not a binary answer.




More Options to Timely Mitigate and Secure Information


Cybercrime prevention technology uniquely provides the opportunity to proactively identify and then mitigate data vulnerabilities before criminals use it. This gives data owners the upper hand in choosing how to respond to control the risk associated with data vulnerability. Options include a localized response (change passwords, lock a payment card, freeze a bank account, etc.), or a larger response (build a fraud fusion center, initiate a response team, install adaptive security measures), or the option to carefully monitor the affected data for future action. Cybercrime prevention technology gives the choice back to the data owner on how to proceed against threats and minimize risk. It breaks the cycle of continuous damage control because it can provide a complete picture of a cyber event or potential cyber event, allowing more time to explore response choices. With virtually unlimited data points that can be modeled against unlimited sets of identifiers and data tags, cybercrime prevention technology can also proactively pursue dynamic leads on criminal activity.




The Limitless Potential of Cybercrime Prevention Technology


The power to discover, pursue, mitigate, and secure data is limitless through the cybercrime prevention technology created by cybercrime consultancy and software developer Cyber Team Six®. The efficacy behind the innovative technology is rooted in a proprietary software that creates non PII, or anonymous, data fingerprints to identify and collect data about cyber threats targeting a company’s employees, customers, and vendors. A follow-on proprietary process maps hidden connections between access or data stolen by cyber threats and disparate internal data points about employees, customers, and vendors to expose risks and vulnerabilities with a near-perfect confidence rate. For example, one global financial institution uses cybercrime prevention technology to identify fraud schemes, synthetic identity creation, IP theft attempts, money laundering networks, shell businesses trying to avoid supply chain controls, and more. Cybercrime prevention technology adapts to every business, industry, institution, and government entity tasked with the handling of information.




How is CT6 Cybercrime Prevention used Today?


CT6.® Cybercrime Prevention changes the paradigm of security across all business enterprises and government entities by proactively protecting CT6.® clients and disrupting the business of cybercrime. CT6.® Fraud Preventer technology broke the business cycle of malware-enabled fraud targeting the customers of a global financial institution stopping the campaign in its tracks and avoiding a fraud loss of millions of dollars. More telling, criminals moved on to softer targets as the profit stream from targeting the now-protected financial institution dried up. CT6.® CredProtect technology was integrated into a large U.S. based power utility, radically limiting their cybersecurity risk profile and closing thousands of known points of criminal access into the network that could often lead to follow on disruptive attacks, such as ransomware. CT6.® expertise informs the U.S. Intelligence Community’s efforts to reduce risk to hostile threat actors in critical infrastructure with already proven results in eliminating nation-state supply chain risk.