Unauthorised Software Installation
business infrastructure is an area open to attacks and illegal use
by various sources. Some of these are internal and some external.
the greatest threats is the installation of unauthorised software in
your business computers. Although it is understandable that some
employees will want to make a certain private use of these computers
(especially salespersons and people who get their laptops home), it
is your responsibility to make sure that laws are not broken.
employee installs pirate software or uses a Peer-to-Peer (P2P)
platform to download pirate music and movies, then you may find
yourself being liable for their actions, as it is your
infrastructure used for the act of piracy and you did nothing to
prevent it. If someone downloads child pornography on a computer
belonging to you or your company, you may have a lot of explaining
to do and a lot of trouble proving you knew nothing about it.
Software maybe installed in your business computers in many
different ways. It can be through a CD/DVD disk an employee has
inserted in a drive, from a USB key or from the internet.
is also the possibility that someone installed some software and
after they were done with it, they removed it. However traces of its
use and internet access may still be there.
are suspicious about the security of your business network and the
laptops that leave the vicinity of your premises, then Strathclyde
Forensics can investigate in a discreet and professional way.
us for an informal no-obligation consultation.