

CT6.® Cybercrime Prevention
A New Edge of
Awareness
Preemptive Solutions to Defeat Cybercrime
Cybercrime losses will top $6 trillion in 2021.
Cybersecurity alone cannot stop criminals before they strike.
CT6.® created Cybercrime Prevention to stop criminals before they attack.
As digital attacks advance, cybersecurity technology often lags, compelling a repeating cycle of damage control.


CT6.® Cybercrime Prevention
CT6.® Cybercrime Prevention sees beyond network defenses to find the risk of digital attacks hiding within the relationships and remote connections that eventually touch a business or an organization.
CT6.® Cybercrime Prevention Uncovers Existing & Emerging Threats
To stop ransomware, malware, credential attacks, phishing, theft, fraud, sabotage, and more.


Cybersecurity protects your network. Cybercrime Prevention protects your business.

Cyber & Data Safety
The practice of good cyber hygiene.
Examples: Password managers, MFA, VPNs, credit monitoring, digital footprint awareness, data encryption, smart clicking, user training, etc.

CyberSecurity
The in-progress defense and preservation of networks, hardware, software, and data.
Examples: Antivirus software, firewalls, domain monitoring, cyber threat intel, advanced malware protection, DNS filtering, Cyber AI, etc.

Cybercrime Prevention
The preemptive degradation of cybercriminal acts to prevent fraud, theft, and sabotage.
Examples: Pinpoint Transactional Risk Scoring, Criminal Behavior Analytics & AI, Preemptive Fraud Controls, User Indiscretion Resolution, Vendor-Enabled Cybercrime, Dynamic Compromised Credential Remediation, etc.
CT6.® Cybercrime Prevention Stops Digital Attacks
Breach Event
Point of Failure
Cybercrime Prevention
Colonial Pipeline
2021
Threat type
Ransomware
Remote employee used compromised or easily guessed RDP credentials
Before the attack, identify compromised employee RDP credentials through CT6.® CredProtect, preventing a major business disruption
Bitcoin Exchangers
2016 to Present
Threat type
Credential Stuffing Attacks
Customers re-used compromised login credentials discovered by cybercriminal credential stuffing attacks.
Preemptively identify and remediate customers that have compromised credentials through CT6.® CredProtect
Zelle product rollout
2018
Threat type
Banking Trojans
Latent malware compromised customer endpoints
CT6.® Indicators of Financial Compromise (IoFC)® alerts through CT6.® Fraud Preventer for anti-fraud departments on customers infected with malware, preventing future fraud transactions
OMB
2013-2015
Threat type
Compromised Credential Re-use
Sensitive data theft via third- party (vendor) remote access
Identify compromised third-party access through CT6.® CredProtect to allow remediation before the massive data theft occurred
Banks and Online Retailers
2000's - Present
Threat type
Financial Theft Malware
Customer compromised devices passively collecting debit and credit card information.
CT6.® Indicators of Financial Compromise (IoFC)® alerts through CT6.® Fraud Preventer for anti-fraud departments on customers infected with malware, preventing future fraud transactions
Governments, Utilities, Businesses, Organizations
2000's - Present
Threat type
Phishing
External & internal users socially engineered to enter PII, financial information, and login credentials to phishing websites
CT6.® Indicators of Financial Compromise (IoFC)® alerts through CT6.® Fraud Preventer of individual users or customers who visited a phishing website
CT6.® Cybercrime Prevention is a New Technology
It is the first of its kind. It represents a wholesale change in the way the world will secure its information. Cybercrime Prevention technology quickly uncovers and maps hidden connections between disparate data points to expose risks and vulnerabilities that cybersecurity measures alone cannot. It means finding the unknowns (e.g., method, source, extent, all affected data) internal and external to a network to prevent sophisticated digital attacks. The proactive nature of Cybercrime Prevention marks the difference between enduring repetitive cycles of damage control versus preemptively stopping criminals before they attack.
![iStock-868075408-[Converted].jpg](https://static.wixstatic.com/media/214dc4_b3ec5f3fbab54a7bbe6b94e0dc3bfb0a~mv2.jpg/v1/fill/w_980,h_612,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/214dc4_b3ec5f3fbab54a7bbe6b94e0dc3bfb0a~mv2.jpg)
CT6.® Cybercrime Prevention
A New Edge of
Awareness
-
Privacy and Search Accuracy tool – The proprietary process of creating a partial hash or partial-partial hash (digital fingerprint) of data to erase identifiers while improving data matching capabilities. (U.S. Pat. Pend.)
-
Wide Aperture Data Hunting - A proprietary software-based capability that identifies customer, employee, and vendor points of compromise, independent of a connection to an organization, among 23+ billion of pieces of data. Data types include digital device identifiers, payment cards, login credentials, financial transaction data, and all PII. (U.S. Pat. Pend.)
-
IoFC® Matching Logic - A proprietary methodology used to uncover and map hidden connections between disparate and remote data points to expose customer, remote workers, and vendor/supplier risks. IoFC (Indicators of Financial Compromise)® is trademarked as a new way of discovering cybercrime risk. (U.S. Pat. Pend.)
-
IoFC® Cybercrime Risk Signaling – The product of IoFC® Matching Logic, this proprietary software-based capability produces the early warning cybercrime risk indicator that CT6.® users receive to manage and mitigate risk days, weeks, or months before the criminal can commit fraud, theft or sabotage. (U.S. Pat. Pend.)
-
Criminal Behavioral Analytics - The process that exposes exactly how the criminal business cycle converts data and access into fraud, theft, and sabotage against a business/organization.
-
Legal & Ethical - No data or access is purchased from cybercriminals (U.S. DOJ & E.U. GDPR Compliant).
-
Privacy Compliant - No customer, employee, or vendor PII leaves the company network through CT6.® partial hash technology and non-PII data filters. (U.S. Pat. Pending)
-
Frictionless Touch – Adds no friction to user experiences; CT6.® works offline and onsite.
-
Automated Results – Results delivered without human interaction as an on-premise software or cloud-hosted solution.
Who needs Cybercrime Prevention?
-
Online Retailers/Sales Platforms, Financial Services, Financial Institutions, FinTech
-
Any environment with critical supply chains
-
Any environment with remote employees
-
Any high security environment (defense firms, government, utilities)
-
Cyber Insurance Providers
How CT6® Stops Cybercriminals:
-
Identify potential cybercriminal access to customers before it turns into a fraud event.
-
Identify potential cybercriminal access to remote employees before it tarnishes reputations or disrupts business operations.
-
Identify potential cybercriminal access to supply chains before it leads to sensitive information theft or business operations disruption.
-
Identify potential cybercriminal access to employees and vendors before it turns into classified information theft or critical infrastructure sector disruption.
-
Limit claims by identifying potential and current policyholder risk to cyber-enabled fraud, sensitive information theft, or business operations disruption.
CT6.® Cybercrime Prevention
Our Address
Cyber Team Six, LLC
227 W. 4th Street, Suite 325
Charlotte, NC 28202