TEGO CYBER SECURITY – ICI’s exciting new client

ICI’s exciting new client, Tego Cyber has requested the we enlighten our associates and clients to this powerful new cyber security solution. As a rule, we do not disclose client names but, in this case, we feel compelled to release this information.

TEGO Cyber’s mission is to deliver an intelligent, state-of-the-art threat intelligence platform with a proprietary process of collecting and enriching threat data to help enterprises identify threats within their environments.

TEGO Cyber threat intelligence application helps enterprises meet the challenges of today’s connected business world. This is an advanced threat intelligence platform utilizing proprietary software solutions for the enterprise space; the founding team is highly experienced and recognized within the cyber security field. The TEGO threat intelligence [platform (TTIP) integrates with top end security platforms to gather, analyze and proactively identify threats to an enterprise network. As a result:

A proprietary process is used to compile, analyze and then deliver data to an enterprise network in a foprmat that is timely, informative and relevant. This data is provided in context and included specific details for the enterprise to identify and counteract threats.

 

Stay tuned for more on Tego Cyber!

INTERNATIONAL CONSULTANTS & INVESTIGATIONS, INC. PROVIDES BACKGROUND CHECKS

INTERNATIONAL CONSULTANTS & INVESTIGATIONS, INC. PROVIDES BACKGROUND CHECKS FOR:

INVESTMENT BANKING FIRMS

FINANCIAL INSTITUTIONS

JEWELRY COMPANIES

HEDGE FUNDS

TRUCKING COMPANIES

AIRLINES

ENTERTAINMENT COMPANIES

PRIVATE SCHOOLS/SUMMER CAMPS

RELIGIOUS ORGANIZATIONS

COMPANIES THAT EMPLOY DRIVERS HAULING HAZARD MATERIAL

INTERNATIONAL COMPANIES SEEKING TO CONDUCT BUSINESS IN FOREIGN MARKETS, and

INDIVIDUALS LOOKING TO VERIFY INFORMATION REGARDING PERSONAL RELATIONSHIPS

FOR EXAMPLE, ICI’S CONTRACT IN THE MIDDLE EAST REQUIRES ICI TO DETERMINE COMPLIANCE OF FORIGN AIRLINES WITH FAA REGULATIONS NECESSARY FOR ENTRANCE TO U.S. AIRPORTS. ICI COMPLETED BACKGROUND CHECKS ON PILOTS FOR KUWAIT AIRLINES PILOTS.

ICI MEETS THE REQUIREMENT OF COMPANIES CONDUCTING BACKGROUND INVESTIGATIONS: IT IS LICENSED, INSURED AND BONDED IN SEVERAL STATES. UTILIZING A COMPANY LIKE ICI PERMITS A BUSINESS TO MAINTAIN A POSITION OF INDEPENDENCE FOR, AS A THIRD PARTY, ICI IS RESPONSIBLE FOR THE SALIENT DATA THAT COULD CAUSE THE REJECTION OF AN INDIVIDUAL’S EMPLOYMENT.

INTERNATIONAL CONSULTANTS & INVESTIGATIONS, INC. IS FULLY LICENSED, INSURED AND BONDED, WITH AFFILIATIONS WORLD-WIDE. ICI CERTIFIED INVESTIGATORS ARE MEMBERS OF THE COUNSEL OF INTERNATIONAL INVESTIGATORS (CII) INMI, CIS.

PAYPAL IS PROVIDED FOR CLIENTS CONVENIENCE. PLEASE VISIT OUR WEBSITE: www.icicompanies.com.

ATM Users – Beware!

ATM Users – Beware!

ATM users be advised, this counterfeit $20.00 bill, seen below, is one of 100 inserted into an ATM machine in one stack; this is what placed it out of order.  The perpetrators planned to recover an advance fee from the bank of $200.00 utilizing a bank account opened with a stolen identity. This is just one scam involving the ATM machines of major financial institutions as well as the smaller regional banks.

CONCERNS:

First main concern:  bad guys will intentionally place a machine out of order utilizing a jamming device to set up an armed robbery while a technician is repairing the system.  The bank customer may also be forced at gunpoint to withdraw money by an armed robber who will remove the “jam”.  This, unfortunately is more common than most expect, especially at night in remote locations.  Remember,   each ATM machine contains substantial amounts money and is, therefor, a popular target for thieves.

Second main concern: there are mutable capabilities provided bad guys via high tech to obtain your personal data including your account information even as you use the machine.  Avoid using machines not owned by financial institutions such as those found in bodegas, convenience stores, etc.

In the past, a criminal could steal the whole ATM machine.   Mega structures containing these machines have made it very difficult if not impossible to succeed at that.  More reason, therefor, for you to be concerned that you are the “soft” target.

You must be always alert, avoid late night visits to ATM’s in areas of large shopping malls; especially stand alone island machines.  Make sure you observe the surrounding area looking for individuals standing around, often under the influence of alcohol or drugs.  At drive-up machines, as you approach the kiosk, be aware of occupied cars in an overlook position within the area of the ATM.

While utilizing an ATM system: 1) maintain due diligence, make sure you’re not being watched and/or someones has not sidled up to you, 2) If you drove up to a system, once again keep your eyes open for approaching individuals during or persons loitering in a automobile or being a column, 3) avoid machines not operated by financial institutions and 4) If possible avoid late night visits to utilize the ATM system.