New technologies and the propensity for criminals and rogue nations to use these for nefarious purposes has led to a variation in the methods used in extortion attacks. Whether a client’s IT infrastructure is threatened or compromised, or the extortioners use electronic means to channel their threats, additional skills and resources are required to counter such threats.
An understanding of the crime of extortion - including the ability to influence and disrupt the path being pursued by the extortioner - and an understanding of the technical aspects is required.
Where there has been a breach of their systems, clients may require additional support in addition to their own resources. Unity works with IT experts, internal and external to the client, to provide solutions which blend the technical side with an understanding of the criminal mindset.