Some hackers steal data. Others hijack system resources. A few are vandals or pranksters. They use malware, guesswork or deception to exploit networks, and their methods are legion. Worms and viruses arrive as friendly attachments; then they wreak havoc. Phishers snag data using spoof emails. Packet sniffers grab it in transit. Trojan horses launch spyware or exploit vulnerable ports, and keyloggers track your typing. Rootkits force 'zombie' computers to send spam or stage denial-of-service attacks, unknown to their owners. And low-tech tactics, such as cracking passwords by trial and error or making crank calls to helpdesks to obtain passwords, are as formidable as their more sophisticated cousins.
Combating cybercrime is a game of cat and mouse, and good managers keep abreast of trends. No system is impervious. We understand and manage cybersecurity risks. PwC knows crimeware, and our vulnerability assessments promote awareness, preparedness and detection. We excel at data compliance and network investigations, and our experienced EnCase examiners, malware experts and former law enforcement professionals are skilled in digital forensics and cybercrime. Recognize and respond to security breaches, and keep hackers at bay.