We replace uncertainty with answers. Find out how by exploring the actions we take to help you or your industry.
From investigations to cyber security, we find answers to your most critical questions every step of the way.
We bring the unknown to light by helping you manage compliance, navigate litigation, and mitigate risk relating to fraud, impropriety and security threats.
Our experts share their insights.
We're here to help.
Our Experts Share Their Insights
Vulnerability on the rise.
2016 Kroll & Legal Week Benchmarker Report
Read The Report
Insider threat, accidental exposure, even theft of paper records once again factor as predominant causes of data breach for our clients in 2015.
Read the report
2016 Anti-Bribery and Corruption Benchmarking Report
Get Your Copy
On Sept. 12, Oregon Governor Kate Brown issued an executive order for state agencies to initiate plans to centralize information technology security functions by Nov. 1. The order is a response to the antiquated computer systems used by the state that house sensitive information and ultimately is an effort to understand and address cyber security threats to the state.
The recent news of Pippa Middleton’s iCloud account being ‘hacked’ brought the security of the iCloud under scrutiny again. Over the last few years, we have seen more and more headlines about the internet accounts of high profile people, including celebrities and well-known business figures, being ‘hacked’.
The U.S. Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) recently recommended rule-making to extend federal banking disclosure regulations to private trust companies often used by family offices and high net worth individuals to manage investment portfolios.
Study after study finds that employees are regularly using services like iCloud, Microsoft OneDrive (formerly SkyDrive), Google Cloud, Dropbox and many other similar offerings to store corporate data in the cloud.
In the cyber sphere, we take great strides to protect ourselves from outsider threats and hackers eager to breach our virtual walls and abscond with the valuable data inside. But while we’re busy building an impressive barricade against these types of security attacks, there are several ways employees, contractors and/or others who have access to your internal network, computers, and systems can do irreparable damage.
Important reminders to help your organization manage mobile risks
Your peers have spoken: there are a number of cyber security trends and threats that concerned them in 2015—all of which should be on your radar, too.