British Police At War Against Cyber Crime

Cybercrime is an increasingly difficult issue for police forces in our current day and age as their IT resources are not as large as required, but about 53% of all crimes in the UK now have a cyber element. Where traditional forms of theft can be easy to prevent, criminals in Kent county of the UK, are now using the Internet to exploit people and steal their information digitally.

Often scammers will target vulnerable people and the elderly by claiming they are protecting them from the very people they are pretending not to be.

Earlier this year, a woman from Dartford in Kent received a phone call from a man claiming to be from Scotland Yard, who said her grandson had been arrested with cloned bank cards in his possession.  Luckily the woman did not pass on her details, but she got the impression someone would visit her house and ask to take her bank cards if she had.

Scams like this are getting more sophisticated, from phishing emails to ransomware directed at businesses. Criminals using cyber tactics to exploit people are the primary focus for Aimee Payne, Prevent and Protect officer for Kent Police. Ocfficer Payne specialises in cyber fraud prevention for the Kent Police said: "Somebody can attack your computer very, very easily nowadays. And it doesn't take somebody much to do that.

The best way of stopping cyber fraudsters in their tracks, she said, is to educate people on ways of keeping themselves safe from different types of digital crime.

The cyber expert said: "Around 53% of all current crime in Kent has some online element. Aside from personal cyber fraud, businesses are often found at risk of attacks from hackers who are testing their skills.

A common hacking tool is the DDoS (Distributed Denial of Service) which overloads websites with traffic and disrupts the services.

Aimee Payne works with children who have been found to be testing their hacking abilities and committing cyber offences.
She said: "At the moment, we're dealing with children around about 13 who have committed offences, and they're just trialling their skills out, seeing whether they can do it.

"One of the things that we do is educate around the law and give them a choice, whether they're going to go down the right path or the wrong path. Then we give them the resources to be able to utilise the skills in the right way."

Shujun Li, professor of cyber security at the University of Kent, said: "From phishing attacks to ransomware, cyberattacks are a real threat to organisations of all sizes including small and medium-sized businesses, large companies, the public sector and charities across the UK and the world. 

"They are also an increasing threat, with an estimated one third of UK SMEs becoming victims of an attack last year."

Kent Online:         Kent Community Podcast:

You Might Also Read:

Effective Cybersecurity Requires Both Cyber Training & Insurance Cover:

Country Eye App For The Rural Community:

 

 

« Killer Robots For Export
Cyber Skills Shortages Stands At Four Million »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

Akin Gump Strauss Hauer & Feld

Akin Gump Strauss Hauer & Feld

Akin is a leading global law firm providing innovative legal services and business solutions to individuals and institutions. Practice areas include Cybersecurity, Privacy and Data Protection.

Cysec - TU Darmstadt

Cysec - TU Darmstadt

CYSEC is the Cybersecurity faculty of the Technical University of Darmstadt and performs internationally renowned research in numerous areas of cybersecurity.

ESTsoft

ESTsoft

ESTsoft Securedisk is an enterprise-wide file security solution that stores and manages all data in a central file server.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

Corvid

Corvid

Corvid is an experienced team of cyber security experts who are passionate about delivering innovative, robust and extensive defence systems to help protect businesses against cyber threats.

S4x Events

S4x Events

S4x are the most advanced and largest ICS cyber security events in the world.

Ascend Technologies

Ascend Technologies

Ascend Technologies offers a full suite of managed IT services including: Cloud & Infrastructure Management, Cybersecurity Management, Service Desk Management, Application Management , Data Management

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

World Informatix Cyber Security (WICS)

World Informatix Cyber Security (WICS)

World Informatix Cyber Security provides a range of cyber security services to protect valuable information assets to global business and governments.

Secure Systems Innovation Corp (SSIC)

Secure Systems Innovation Corp (SSIC)

SSIC is a cyber risk analytics firm whose mission is to improve how businesses manage cyber risk through the power of data analytics. SSIC developed the X-Analytics cyber risk decisioning platform.

Technisanct

Technisanct

Technisanct works with Governments, especially Law Enforcement and Defence agencies, helping them in monitoring threats, managing their data and resolving their forensic needs.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Auto-ISAC provides a forum for companies to analyze and identify threats sooner and share solutions that enhance vehicle cybersecurity.