By 2021 The Cost Of Cybercrime Will Be $6 Trillion

The worldwide cost cybercrime will be in excess of $6 trillion annually by 2021, up from $3 trillion in 2015, according to  Cyber Security Ventures

There are several factors that contribute to the prediction. In 2018, there were nearly four billion Internet users across nearly 1.9 billion websites this number is likely to rise toward six billion users by 2022

This is the 4th Industrial Revolution and like other revolutions it changes the individuals, economics, government and crime. 
This one employs deep data analysis with inter-connections and links to Bio-technology, Artificial Intelligence, robotics and the Internet of Things which will significantly alter us as humans and the places we work and live. 

When used well these processes ensure our security, as well as significantly improving the broader issues of global and national macro-economics, intelligence, law enforcement and geo-politics. When misused by criminals and cyber warfare activists this transformation has the potential for catastrophic outcomes and we are already experiencing these criminal attacks and crimes. 

Already, these arenas are being used by nations in a similar way that pirates were employed by nations to carry out theft and attacks on other nations shipping.  The Internet is being used in similar ways that oceans where employed for privateering, we are now seeing this in cyber-crime and cyber-warfare. 

The very nature of the Internet creates global collaboration is changing the way in which we view social connections and national borders. Now the modern globalised society is increasingly dependent on an array of organised and sometimes randomly interrelated electronic infrastructures. Many organisations and individuals see Cyber as a growing gossip and intellectually connected strategic and tactical policy network that has current and evolving opinion, news analysis, opportunity with significant security issues that can be used to steal and monitor individuals and organisational data.

Networks leave "exhaust" data, which relates to the activities and transactions of network traders and collaborators, which in turn tells us forensically much about what happened with the data’s use. We are unable to trap and reutilise this in the real world. But in the cyber world we can this is the powerful data that makes networks more efficient, customers better served, companies more knowledgeable. It is also a huge source of insecurity, and we have traded off these disadvantages against the upside until we can do so no more.

Cyberspace has transformed many areas of an organisation’s operational and commercial engagement. It is evolving from a technical and often complex ecosystem into a range of global and tactical actions to strategic system planning. These systems and their engagement require far more senior management understanding and involvement and cannot be left to the technologists. Senior management must engage and understand the strategic plans, commercial opportunities and security implications. 

Cyber has advanced from a professional IT specialty into a crucial critical strategic subject. This has affected everyone from school children, students, workers, spies, journalists, government officials, hackers, propagandists, fund-raisers, PR, company directors and terrorists. 

All forms of electronic connection, communication and attack have become digitised and radically transfigured into a new digital revolution, where different types of computers are becoming the new brain child of our culture. Just as the mechanisation of agriculture and then production took over the mussels and body of our workers so the computer begins to replace our brains.

The term cyberspace is used to describe systems and services connected directly to or indirectly to the Internet, telecommunications and computer networks. However, a useful way in which cyberspace can be visualised is a thin layer or nervous system running through many national and international sectors, enabling them to communicate, operate and function effectively. 

Cyber is changing our understanding and engagements with nationality and our traditional borders as the concept of country is beginning to be redefined. Cyber is altering the way we consider identity, our traditional concepts of hierarchy, beliefs and nationality. 

Cyber interconnection is also shifting our opinions and ideas of truth and authority and national borders present no barrier to cyber exchange and electronic crime both of which are on the increase. Therefore, the modern globalised society is increasingly dependent on an array of organised and interrelated electronic infrastructures and cyber opportunities and security is no longer a pure computer or IT technology issue and many governments and corporations see cyber security as a national policy matter. 

Cyber Attacks and Fraud
Already national crime for most countries is now 50% cyber, yet this is not being focused on by national police forces who don’t have the experience or systems to deal with this type of crime.  To take one example currently Londoners are losing an average of £26 million a month in cyber-attacks on businesses and individuals, Scotland Yard wants to reduce this crime but so far it’s attempts to reduce this crime is not working very well and UK cyber-crime is still rising.

Cyber Security Ventures:     Herjavec 2019 Cybercrime Report:

You Might Also Read: 

Easy Cyber Knowledge Ch.2: Deep Web And The Dark Web (£):

We Can Reduce Cybercrime, But Why Are We Failing?:

 

« Easy Cyber Knowldege Ch.4 The Internet of Things (IoT)
Confidential Data On 24.3m Patients Found Exposed Online »

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

Kernelios

Kernelios

Kernelios is a simulator-based training center and an incubator for cyber experts worldwide.

Zanasi & Partners

Zanasi & Partners

Zanasi & Partners is a security research and advisory company active in the EU and MENA areas. Services focus on technology solutions.

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

Managed Security Services (MSS)

Managed Security Services (MSS)

MSS deliver consultancy services and managed security services for IT departments who may lack the time, resources, or expertise themselves.

Independent Security Evaluators (ISE)

Independent Security Evaluators (ISE)

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research.

Austrian Institute of Technology (AIT)

Austrian Institute of Technology (AIT)

AIT is Austria's largest research and technology organisation and a specialist in the key infrastructure issues of the future including data science and cybersecurity.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.