CT6.® Cybercrime Prevention

A New Edge of

Awareness 

Preemptive Solutions to Defeat Cybercrime

Cybercrime losses will top $6 trillion in 2021.

Cybersecurity alone cannot stop criminals before they strike.

CT6.® created Cybercrime Prevention to stop criminals before they attack.

As digital attacks advance, cybersecurity technology often lags, compelling a repeating cycle of damage control.

lock.png
SCREEN.png

CT6.® Cybercrime Prevention

CT6.® Cybercrime Prevention sees beyond network defenses to find the risk of digital attacks hiding within the relationships and remote connections that eventually touch a business or an organization. 

CT6.® Cybercrime Prevention Uncovers Existing & Emerging Threats

To stop ransomware, malware, credential attacks, phishing, theft, fraud, sabotage, and more.   

money2.png
money.png

Cybersecurity protects your network.  Cybercrime Prevention protects your business. 

login.png

Cyber & Data Safety

The practice of good cyber hygiene.

Examples: Password managers, MFA, VPNs, credit monitoring, digital footprint awareness, data encryption, smart clicking, user training, etc. 

defend.png

CyberSecurity

The in-progress defense and preservation of networks, hardware, software, and data. 

Examples: Antivirus software, firewalls, domain monitoring, cyber threat intel, advanced malware protection, DNS filtering, Cyber AI, etc.

prevent.png

Cybercrime Prevention

The preemptive degradation of cybercriminal acts to prevent fraud, theft, and sabotage.

Examples: Pinpoint Transactional Risk Scoring, Criminal Behavior Analytics & AI, Preemptive Fraud Controls, User Indiscretion Resolution, Vendor-Enabled Cybercrime, Dynamic Compromised Credential Remediation, etc.

CT6.® Cybercrime Prevention Stops Digital Attacks

Breach Event
Point of Failure
Cybercrime Prevention

Colonial Pipeline

2021

Threat type

Ransomware

Remote employee used compromised or easily guessed RDP credentials 

Before the attack, identify compromised employee RDP credentials through CT6.® CredProtect, preventing a major business disruption

Bitcoin Exchangers

2016 to Present

Threat type

Credential Stuffing Attacks

Customers re-used compromised login credentials discovered by cybercriminal credential stuffing attacks.

Preemptively identify and remediate customers that have compromised credentials through CT6.® CredProtect

Zelle product rollout 

2018

Threat type

Banking Trojans

Latent malware compromised customer endpoints

CT6.® Indicators of Financial Compromise (IoFC)® alerts through CT6.® Fraud Preventer for anti-fraud departments on customers infected with malware, preventing future fraud transactions

OMB

2013-2015

Threat type

Compromised Credential Re-use

Sensitive data theft via third- party (vendor) remote access

Identify compromised third-party access through CT6.® CredProtect to allow remediation before the massive data theft occurred

Banks and Online Retailers

2000's - Present

Threat type

Financial Theft Malware

Customer compromised devices passively collecting debit and credit card information.

CT6.® Indicators of Financial Compromise (IoFC)® alerts through CT6.® Fraud Preventer for anti-fraud departments on customers infected with malware, preventing future fraud transactions

Governments, Utilities, Businesses, Organizations

2000's - Present

Threat type

Phishing

External & internal users socially engineered to enter PII, financial information, and login credentials to phishing websites

CT6.® Indicators of Financial Compromise (IoFC)® alerts through CT6.® Fraud Preventer of individual users or customers who visited a phishing website

CT6.® Cybercrime Prevention is a New Technology

It is the first of its kind.  It represents a wholesale change in the way the world will secure its information.  Cybercrime Prevention technology quickly uncovers and maps hidden connections between disparate data points to expose risks and vulnerabilities that cybersecurity measures alone cannot. It means finding the unknowns (e.g., method, source, extent, all affected data) internal and external to a network to prevent sophisticated digital attacks. The proactive nature of Cybercrime Prevention marks the difference between enduring repetitive cycles of damage control versus preemptively stopping criminals before they attack.  

iStock-868075408-[Converted].jpg

CT6.® Cybercrime Prevention

A New Edge of 

Awareness 

  • Privacy and Search Accuracy tool – The proprietary process of creating a partial hash or partial-partial hash (digital fingerprint) of data to erase identifiers while improving data matching capabilities. (U.S. Pat. Pend.)
     

  • Wide Aperture Data Hunting - A proprietary software-based capability that identifies customer, employee, and vendor points of compromise, independent of a connection to an organization, among 23+ billion of pieces of data.  Data types include digital device identifiers, payment cards, login credentials, financial transaction data, and all PII. (U.S. Pat. Pend.)
     

  • IoFC® Matching Logic - A proprietary methodology used to uncover and map hidden connections between disparate and remote data points to expose customer, remote workers, and vendor/supplier risks. IoFC (Indicators of Financial Compromise)® is trademarked as a new way of discovering cybercrime risk. (U.S. Pat. Pend.)
     

  • IoFC® Cybercrime Risk Signaling – The product of IoFC® Matching Logic, this proprietary software-based capability produces the early warning cybercrime risk indicator that CT6.® users receive to manage and mitigate risk days, weeks, or months before the criminal can commit fraud, theft or sabotage. (U.S. Pat. Pend.)
     

  • Criminal Behavioral Analytics - The process that exposes exactly how the criminal business cycle converts data and access into fraud, theft, and sabotage against a business/organization.
     

  • Legal & Ethical - No data or access is purchased from cybercriminals (U.S. DOJ & E.U. GDPR Compliant).  
     

  • Privacy Compliant - No customer, employee, or vendor PII leaves the company network through CT6.® partial hash technology and non-PII data filters. (U.S. Pat. Pending) 
     

  • Frictionless Touch – Adds no friction to user experiences; CT6.® works offline and onsite.  
     

  • Automated Results – Results delivered without human interaction as an on-premise software or cloud-hosted solution. 

ct6logo.png

Looking for more?  Read our White Paper:

The Business of Cybercrime

Who needs Cybercrime Prevention?

  • Online Retailers/Sales Platforms, Financial Services, Financial Institutions, FinTech

  • Any environment with critical supply chains 

  • Any environment with remote employees 

  • Any high security environment (defense firms, government, utilities)

  • Cyber Insurance Providers

How CT6® Stops Cybercriminals:

  • Identify potential cybercriminal access to customers before it turns into a fraud event.   

  • Identify potential cybercriminal access to remote employees before it tarnishes reputations or disrupts business operations.    

  • Identify potential cybercriminal access to supply chains before it leads to sensitive information theft or business operations disruption.   

  • Identify potential cybercriminal access to employees and vendors before it turns into classified information theft or critical infrastructure sector disruption.

  • Limit claims by identifying potential and current policyholder risk to cyber-enabled fraud, sensitive information theft, or business operations disruption.  

CT6.® Cybercrime Prevention

Contact Us

Thanks for submitting!

Our Address

Cyber Team Six, LLC

227 W. 4th Street, Suite 325

Charlotte, NC 28202