Addressing Cyber Threats With Positive Action

Hacking and other types of cyber attacks on business have increased considerably since 2018 and cybercrime in all its forms is hitting business with ever- increasing costs and so it is important to review your prospects and security against cyber-attacks in 2020/21.

The year 2018 was a watershed which saw a massive increase in global cyber-crime with Interpol reporting that it now runs in the billions of dollars. In the UK with 65% of large firms realised that they had been breached and attacked with ransomware  becoming one of the most lucrative sources of criminal profit.

Cyber criminals have learnt from their own successful experince and are now far more effective in their attack and theft processes. Many of cybercrime groups are now organising themselves along more traditional business processes which are are improving their effectiveness. Cyber crime is now the fastest growing areas of global crime and instead of a few small groups and some individuals committing the crimes. organiswed groups have grown and operate with a level of sophistication very similar  to large business models.

The crimes themselves have not changed dramatically as the criminals are still taking money from fraud, theft, gambling and illegal drug and fake medicine sales, but the expansion of the criminal activity to cyber-crime is far more effective and profitable for criminal business in general. 

  • The British Office for National Statistics (ONS) said in 2018 that computer misuse and malware against business was significantly increasing and was up 63% in a year.  
  • The Bristsish  National Cyber Security Centre (NCSC)  has said that cyber-crime has now reached its highest level to date and is asking all governments to advise all business to improve their cyber-security standards and actions.

The UK has made some progress but more police training is required as cyber-crime is now widkey considered to be equivalaent tpover 1% of UK GDP by the end of 2019. 

Other than a lack of real cyber training for all police officers, one of the current problems is that many businesses are still not reporting cyber-attacks and this reticence is usually connected with a fear of reputational dmage and related  public relations effects.

Cisco is now running a cyber security training programmed for 120,000 British police officers, although it is still the case that  reporting a cyber crime to the UK police in the UK is not easy. In the case of stolen personal banking data where victims have had their bank accounts robbed, the police often refer vistims back to their bank rather than dealing with the crime.  

The problem for the UK police is that they are overstretched with the numbers of police at its lowest level since 1981 and in many forces there is no capacity within the regional forces to spend the necessary time on cyber crime. Budgets for electronic systems has not for most governments, police services or commerce grown yet the potential for cyber-attacks has increased significantly and this reality will become more of a problem for many organisations over the coming months. 
There are no simple answers but staff training, understanding your security issues and more carefully managing your data has become crucial.  

There are a number of issues you should be monitoring including such areas as your use of cloud, training to reduce phishing attack effects and where a lot more different systems are connected. 

Often this is due to lack of training or when an employee leaves either through redundancy or because they have had an argument with their colleagues and or management or just because their access to the system has not been completely shut-down and so they still have access. 

The Costs Of Cyber Security
One of the issues that needs attention is to carefully budget for how much cyber security investment should be made and this should start with analysing how much an attack could cost and its effects. Getting an independent review of your systems and personnel cyber comprehension is very worthwhile and gives you a much better understanding of the risks and ways to improve the people and systems. 

Some of the broader issues that will affect organisations in 2019 will be due to AI and the ability to change and create fake news using video and audio spoofing.

One way this can affect you and your organisation is that these fake pieces can be used to get your staff to wrongly change something within the systems. Or it can create fake emails that con and mislead employees to pass over passwords or sensitive data and information. 

These effects can also be used to create fake news about a government or a company’s activities and it is very important that you tackle these issues by going through a thorough review and internal audit process will give business decion-makers a much better understanding of the potential issues and where positive action can take place 

You Might Also Read: 

Cyber Intelligence & Business Strategy:

Positive Cyber-Secure Training:

 

 

 

« Security Advice For Using Video Conference Tools
British Spies Looking For Private AI »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

INCIBE-CERT

INCIBE-CERT

INCIBE-CERT is the reference security incident response center for citizens and private law entities in Spain

Visa

Visa

Visa is a global payments technology company that connects consumers, businesses and banks in more than 200 countries and territories worldwide.

TCPWave

TCPWave

TCPWave IPAM is the world’s first acclaimed DNS/DHCP management software to pass the most stringent Information security tests.

Enosys Solutions

Enosys Solutions

Enosys Solutions is an IT security specialist with a skilled professional services team and 24x7 security operations centre servicing corporate and public sector organisations across Australia.

Advisera 27001Academy

Advisera 27001Academy

Advisera is a market leader in providing documentation and online support for the implementation of business standards including ISO 27001, ISO 22301 and EU GDPR.

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM) is engaged by law enforcement in the UK and overseas to advise on establishing and developing Cyber Resilience Centres (CRCs) for business.

SkyePoint Decisions

SkyePoint Decisions

SkyePoint Decisions is a leading Cybersecurity Architecture and Engineering, Critical Infrastructure and Operations, and Applications Development and Maintenance IT service provider.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

Condition Zebra

Condition Zebra

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification in the field of cybersecurity.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

Chugach Government Solutions (CGS)

Chugach Government Solutions (CGS)

CGS performs work for the Federal Government across 4 unique core lines of business, including: Facilities Management and Maintenance, Construction, Technical IT and Cyber Services, and Educational Se

FluidOne

FluidOne

FluidOne are an award-winning Connected Cloud Solutions provider. We design tailored solutions to help customers and partners digitally transform their IT and communications.

Pistachio

Pistachio

Pistachio is the new evolution of cybersecurity awareness training and attack simulations.

Doherty Associates

Doherty Associates

Drawing on our deep industry knowledge and business insight, Doherty deliver intelligent IT solutions and services that help people work more securely, more productively and more creatively.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.