📄 Extracted Text (569 words)
From: Investigative Management Group
Sent: Tuesday, January 17, 2017 7:47 PM
To: [email protected]
Subject: FBI and DI-IS Joint Report
<http://r20.rs6.net/o=.jsp?a=1109132129719&r=3&c=485128c0-7cda-11e3-979e-
d4ae529a8786&d==126945024158&ch=491981d0-7cda-11e3-9132b-d4ae529a8786&ca=befl7d1b-4b92-=943-adc0-
881bba331c0d&o=https://imgssl.constantcontact.com/ui/images1/s.rif>
While ad=ancements in technology have drastically changed our industry, IMG has mat=hed pace and grown our
expertise with these changes. From access to global=databases to cyber crime investigations, our team continues to
provide the=best in practice for our clients. Please see the following link for = recent report issued jointly by the FBI and
OHS on cyber attacks: <= style="color:blue;text-decoration:underline;" track="on"
href="http=//r20.rs6.net/tn.jsp?f=001iPs5zI1RFKfh8A9-s9kzN-ZHbKDXJal3d2FvqGVTk6hS9V=PR KAc83cavhqt_w1O-
fYGT7CFgxK2xmF9qXBsLtPS35rT4FkbmW6wBEYojGyRmJQpVbwYKoJ=saaql6ypTPK_gTJv6k2c10NuY_8Glfxkp-
mbGDIIsltvGSO4tSBOj7kXHSlkngsotxvKBSmNRi=jSdpydk88dCkSIXvsIMwjnlgRxQlUrnlVvIBGRU65hQPkSywOHmV6gDbt
D&c=TydnN1NFVa=BBIF-wpZ7dCtF-
23owWZwa3ivah8ukAIWPcEBEagg4Ow==&ch=9w.leV7ZGjpschGYhYu2=zs9IrxhBliVlnPluN9M9p3eSeU_h0WdXeg=="
shape="rect" linktype="docum=nt" ref="ACCOUNT.DOCUMENT.24"
alt="http://files.constantcontact.com/7b=3d6d3201/7ff9e12b-eae8.4cfa-9bc3.114475f77c99.pdf" target="_blank"
title=3D"undefined">FBI and DHS Joint Report. Both agencies recommend best practices to enhance yo=r organization's
cyber security posture.
IMG can =onduct a preliminary review of your company's IT system. IMG will fo=ward to your company's IT staff a
straightforward questionnaire (20 questi=ns) that will provide a general overview of your company's IT posture.&nbs=;
After analyzing the questionnaire, we will work with your IT staff to co=duct a review of your network. This review will
be both on-site and =ff-line and upon completion a report will be prepared detailing the findin=s and recommendations.
Investigative Management Group's Services:
DIGITAL FORENSICS/CYBER SECURITY - Cybercr=me is at an all-time high and has become an ever-increasing threat.
IMG's =igital Forensic/Cyber Security division can conduct a comprehensive assess=ent of your I.T. systems. This
assessment includes an evaluation of the cu=rent security system's policies and procedures and recommendations to
enha=ce overall efficiency and cost effectiveness.
BACKGROUND INVESTIGATIONS - IMG provides a comprehensive analysis of a potential business partner, entity=
investor, employee or individual, both domestically and abroad. IMG condu=ts inquiries that include federal criminal
records, civil litigation, empl=yment history, UCC filings and warrants, real and personal property holdin=s, all corporate
and business affiliations, regulatory searches in relevan= industries, United States Tax Court records, and a full media
search, inc=uding relevant trade and business media.
EFTA_R1_01323382
EFTA02348896
SECURITY/EXECUTIVE PROTECTION - IMG pr=vides secure transportation and security for your employees or family
duri=g international or domestic travel. IMG personnel conduct reconnaissance i= the areas of the particular visit, which
could include preparing primary =nd alternate driving routes, identifying safe locations, medical facilitie= and centers of
law enforcement and liaising with other representatives, s=curity organizations or government agencies as required.
IMG performs a comprehensive analysis o= a company's vulnerability to a range of threats, including terrorist atta=ks,
natural disasters, workplace violence, theft and spying.
LITIG=TION SUPPORT - l</=pan>MG provides a range of i=vestigative and intelligence-gathering services on behalf of
attorneys and=their clients. IMG assists legal counsel in the discovery process by ident=fying and interviewing witnesses,
locating assets, assessing net worth, an= conducting background investigations and surveillance when appropriate.
W=en investigating internal fraud, workplace violence, sexual harassment and=discrimination cases, IMG works with
companies to uncover early warning si=ns, creates an action and response plan, and helps deploy professional sta=f to
assist and counsel employees in the aftermath of an incident. =/span>To help build cases, I=G utilizes digital forensics to
uncover infiltration or tampering with computer systems and=electronic assets, and helps recover lost data and
corrimunications.<=div>
&=bsp; INVESTIGATIVE MANAGEMENT G<=pan style="font-size:10pe>ROUP
&=bsp; A Unit of Strang Hay=s Holding Corporation
New York&n=sp;
Miami
&=bsp; www.investigativemanagement.com <http://r20.rs6.net/tn.jsp?f=001iPs5zI1REKfh8A9-s9k=N-
ZHbKDXJal3d2FvqGV116hS9V_PR_KASWEVbCNasSTKKhnFxclZPEBgbKQEs9LcWUVdl-
nGr=OIAntD(yAkwu6A3uY2_GiPDNrse6-
RwNzmFDaugLE8s779Zj0U7Wjjefl2c2shB3hsxRkaDVd2=keKI_HCoC0XE840.I7vRYo6&c=TydnN1NFVaEBBIF-wpZ7dOF-
23owW2wa3ivah8ukAIWPcE8=agg4Ow==&ch=9wieV72GjpschGYhYu28zs9IrxhBliVlnP1uN9M9p3eSeU_h0WdXeg=3D=>
<=td>
<https://imgssl.constantcontact.com/=etters/images/sys/S.gif> , 825 3rd Avenue,&nb=p;FL 18, New York, NY
=10022
SafeUnsubscribe&=rade; [email protected]
<https://visitor.constantcontact.=om/do?p=un&m=001LVVToalgxoYVZt13kFZ6_0w%3D%3D&ch=491981d0-7cda-lle3-
9=2b-d4ae529a8786&ca=befl7d1b-4b92-4943-adc0-881bba331c0d>
Forward this email
<http://ui.constantcontact.com/s=/fwtf.jsp?Ilr=xnn9w5iab&m=1109132129719&ea=jeevacation%40gmail.com&a=3011
26945024158> &=bsp; I Update=Profile
<https://visitor.constantcontact.com/do?p=oo&m=001LWToalgxoYVZt=3kFZ6_0w%3D%3D&ch=491981d0-7cda-lle3-
982b-d4ae529a8786&ca=befl7d1b-4b9=-4943-adc0-881bba331c0d> I =/span>Abo=t our service provider
chttp://www.constantcontact.com/legal/service-provider?cc=abou=-service-provider>
Sent by [email protected] <mailto:[email protected]>
<https://imgssl.constantcontact.c=m/letters/images/sys/S.gif>
2
EFTA_R1_01323383
EFTA02348897
ℹ️ Document Details
SHA-256
5d635a935037da6bea6c13dbc053db7c6837ab88331625ab4300385c5fb643d7
Bates Number
EFTA02348896
Dataset
DataSet-11
Document Type
document
Pages
2
Comments 0