British Police At War Against Cyber Crime

Cybercrime is an increasingly difficult issue for police forces in our current day and age as their IT resources are not as large as required, but about 53% of all crimes in the UK now have a cyber element. Where traditional forms of theft can be easy to prevent, criminals in Kent county of the UK, are now using the Internet to exploit people and steal their information digitally.

Often scammers will target vulnerable people and the elderly by claiming they are protecting them from the very people they are pretending not to be.

Earlier this year, a woman from Dartford in Kent received a phone call from a man claiming to be from Scotland Yard, who said her grandson had been arrested with cloned bank cards in his possession.  Luckily the woman did not pass on her details, but she got the impression someone would visit her house and ask to take her bank cards if she had.

Scams like this are getting more sophisticated, from phishing emails to ransomware directed at businesses. Criminals using cyber tactics to exploit people are the primary focus for Aimee Payne, Prevent and Protect officer for Kent Police. Ocfficer Payne specialises in cyber fraud prevention for the Kent Police said: "Somebody can attack your computer very, very easily nowadays. And it doesn't take somebody much to do that.

The best way of stopping cyber fraudsters in their tracks, she said, is to educate people on ways of keeping themselves safe from different types of digital crime.

The cyber expert said: "Around 53% of all current crime in Kent has some online element. Aside from personal cyber fraud, businesses are often found at risk of attacks from hackers who are testing their skills.

A common hacking tool is the DDoS (Distributed Denial of Service) which overloads websites with traffic and disrupts the services.

Aimee Payne works with children who have been found to be testing their hacking abilities and committing cyber offences.
She said: "At the moment, we're dealing with children around about 13 who have committed offences, and they're just trialling their skills out, seeing whether they can do it.

"One of the things that we do is educate around the law and give them a choice, whether they're going to go down the right path or the wrong path. Then we give them the resources to be able to utilise the skills in the right way."

Shujun Li, professor of cyber security at the University of Kent, said: "From phishing attacks to ransomware, cyberattacks are a real threat to organisations of all sizes including small and medium-sized businesses, large companies, the public sector and charities across the UK and the world. 

"They are also an increasing threat, with an estimated one third of UK SMEs becoming victims of an attack last year."

Kent Online:         Kent Community Podcast:

You Might Also Read:

Effective Cybersecurity Requires Both Cyber Training & Insurance Cover:

Country Eye App For The Rural Community:

 

 

« Killer Robots For Export
Cyber Skills Shortages Stands At Four Million »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

Cyber Risk & Insurance Forum (CRIF)

Cyber Risk & Insurance Forum (CRIF)

CRIF helps organisations understand cyber risks and the damage that might occur by supporting the development of effective insurance solutions.

Sikur

Sikur

Sikur have developed a communication platform that sets new boundaries for corporate privacy and security.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

Novastor

Novastor

NovaStor® is an award-winning, international data backup and recovery software company with solutions supporting physical, virtual and cloud environments.

OwnZap Infosec

OwnZap Infosec

OwnZap Infosec aims to digitally shield the cyberspace by offering services like Penetration Testing and Red Teaming, Infrastructure Security Testing, and Vulnerability Assessments.

Sentrium Security

Sentrium Security

Sentrium is committed to helping organisations protect their technology, information and people. Our range of bespoke services provide solutions to tackle a broad range of cyber security challenges.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

Grindstone Ventures

Grindstone Ventures

Grindstone Ventures is a post-seed fund that supports post-seed equity and quasi-equity investments in early-stage innovation-driven and/or technology companies.

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

Delta Partners

Delta Partners

Delta Partners is a venture capital firm investing in Ireland and the United Kingdom with a strong focus on early stage technology companies.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.

Scalarr

Scalarr

Scalarr is an innovative, next-generation cyber security firm focused on automation and AI to detect and prevent threats in mobile and Edge/IoT infrastructures.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.

Aikido Security

Aikido Security

Aikido is the no-nonsense security platform for developers. Secure your code, cloud, and runtime in one central system. Find and fix vulnerabilities automatically.

Sectricity

Sectricity

As independent ethical hackers, Sectricity go beyond traditional security, uncovering every vulnerability - testing both systems and employees to eliminate weak spots.

Harmony Intelligence

Harmony Intelligence

Harmony builds cutting-edge defensive AI products that safeguard people and critical infrastructure around the world from AI-powered threats.