HKA’s Digital Security Service

HKA offers an enterprise and individualized service designed to minimize digital risk exposure.
Focused on digital crime and fraud prevention, HKA’s Digital Security Service provides clients with an “outside-in” view of their personal data exposure.
Complex digital investigations & fraud prevention
Our service identifies, remediates, and protects executives, board members, high-net-worth individuals, and other prime targets against threats such as fraud, theft, impersonation, and extortion. Unlike most digital security services that focus on the “inside-out” view by strengthening internal defenses and technical controls, our Digital Security Service takes the perspective of criminals and malicious actors.
Our digital security experts first seek information that bad actors can access and use for nefarious intent, such as breach data, compromised domains/computers/ credentials, data brokers, social media chatter, dark web forums, and publicly available information. They then aggregate and present these disparate sources in a structured report that identifies weak points and vulnerabilities that can be easily exploited. Using this information, our experts develop a customized remediation plan that limits exposure and provides ongoing monitoring solutions to prevent future attacks.
How we work
Our world-class experts have digital, open-source intelligence, fraud prevention, anti-money laundering, and national security advisory and investigatory experience gained by working in or with Fortune 100 organizations, the U.S. Intelligence Community, law enforcement, and technology companies. We leverage and partner with best-of-breed third-party tools, artificial intelligence-enabled platforms, and databases to support our investigative work.
Our approach
HKA works closely with clients to determine the most appropriate approach before an investigation. For example, it might be best to begin with an individual search instead of an organizational one or vice versa. Based on the need, only one investigative path may be required. Clients that stand to benefit most from HKA’s Digital Security Services include, but are not limited to, the following:
• Boards of Directors, C-Suite & Executives
• Fraud Prevention Teams
• High-Net-Worth Individuals/VIPs
• Private Equity & Investor Communities
• Risk Managers & Insider Threat Leaders
• Insurance Companies and Brokers
• Law Firms
HKA in numbers
45+
offices
1,000+
17 countries experts, consultants and advisors

Data sources & methods
Using a variety of data – ranging from historical sets that go back more than 20 years to near real-time resources that can update hourly – HKA focuses primarily on three sources:
• Breach: Collections of previously stolen or non-public data sets on the open Internet, dark net, and closed hacker forums.
• Reconnaissance: Collections gathered by searching publicly available information to identify vulnerabilities that can be exploited.
• Open-Source Intelligence (OSINT): Collections gathered and analyzed from easily accessible data sources (e.g., Internet search engines, social media, print and online news media, dark web, online directories, government records, etc.).
Collectively, this personally identifiable information (PII) develops an intimate picture of an individual’s life, allowing criminals to tailor-design attacks such as phishing, impersonation, romance and investment scams, doxing, banking compromise, and much more.
Cybercrime victim reports
Knowledge, followed by prevention strategies, creates a powerful risk mitigation approach that reduces exposure and liability. HKA’s Digital Security Service is designed for knowledge and prevention. It first performs a deep-dive digital investigation to create a Cybercrime Victim Report. Then, the service develops a remediation strategy to immediately reduce the client’s exposure and ensure re-exposure is limited over the longer term.
Initiating an investigation can begin with limited data points such as a single email address or, in the case of the enterprise, an email domain(s). Our digital security experts cross-reference these data points against billions of records. The results can be astounding, ranging from familial and personal connections, phone numbers, home addresses, vehicle identification numbers, digital devices, health and financial information, and more. Once identified and collated, our experts give the client a risk score and move to actionable remediation efforts.