By 2021 The Cost Of Cybercrime Will Be $6 Trillion

The worldwide cost cybercrime will be in excess of $6 trillion annually by 2021, up from $3 trillion in 2015, according to  Cyber Security Ventures

There are several factors that contribute to the prediction. In 2018, there were nearly four billion Internet users across nearly 1.9 billion websites this number is likely to rise toward six billion users by 2022

This is the 4th Industrial Revolution and like other revolutions it changes the individuals, economics, government and crime. 
This one employs deep data analysis with inter-connections and links to Bio-technology, Artificial Intelligence, robotics and the Internet of Things which will significantly alter us as humans and the places we work and live. 

When used well these processes ensure our security, as well as significantly improving the broader issues of global and national macro-economics, intelligence, law enforcement and geo-politics. When misused by criminals and cyber warfare activists this transformation has the potential for catastrophic outcomes and we are already experiencing these criminal attacks and crimes. 

Already, these arenas are being used by nations in a similar way that pirates were employed by nations to carry out theft and attacks on other nations shipping.  The Internet is being used in similar ways that oceans where employed for privateering, we are now seeing this in cyber-crime and cyber-warfare. 

The very nature of the Internet creates global collaboration is changing the way in which we view social connections and national borders. Now the modern globalised society is increasingly dependent on an array of organised and sometimes randomly interrelated electronic infrastructures. Many organisations and individuals see Cyber as a growing gossip and intellectually connected strategic and tactical policy network that has current and evolving opinion, news analysis, opportunity with significant security issues that can be used to steal and monitor individuals and organisational data.

Networks leave "exhaust" data, which relates to the activities and transactions of network traders and collaborators, which in turn tells us forensically much about what happened with the data’s use. We are unable to trap and reutilise this in the real world. But in the cyber world we can this is the powerful data that makes networks more efficient, customers better served, companies more knowledgeable. It is also a huge source of insecurity, and we have traded off these disadvantages against the upside until we can do so no more.

Cyberspace has transformed many areas of an organisation’s operational and commercial engagement. It is evolving from a technical and often complex ecosystem into a range of global and tactical actions to strategic system planning. These systems and their engagement require far more senior management understanding and involvement and cannot be left to the technologists. Senior management must engage and understand the strategic plans, commercial opportunities and security implications. 

Cyber has advanced from a professional IT specialty into a crucial critical strategic subject. This has affected everyone from school children, students, workers, spies, journalists, government officials, hackers, propagandists, fund-raisers, PR, company directors and terrorists. 

All forms of electronic connection, communication and attack have become digitised and radically transfigured into a new digital revolution, where different types of computers are becoming the new brain child of our culture. Just as the mechanisation of agriculture and then production took over the mussels and body of our workers so the computer begins to replace our brains.

The term cyberspace is used to describe systems and services connected directly to or indirectly to the Internet, telecommunications and computer networks. However, a useful way in which cyberspace can be visualised is a thin layer or nervous system running through many national and international sectors, enabling them to communicate, operate and function effectively. 

Cyber is changing our understanding and engagements with nationality and our traditional borders as the concept of country is beginning to be redefined. Cyber is altering the way we consider identity, our traditional concepts of hierarchy, beliefs and nationality. 

Cyber interconnection is also shifting our opinions and ideas of truth and authority and national borders present no barrier to cyber exchange and electronic crime both of which are on the increase. Therefore, the modern globalised society is increasingly dependent on an array of organised and interrelated electronic infrastructures and cyber opportunities and security is no longer a pure computer or IT technology issue and many governments and corporations see cyber security as a national policy matter. 

Cyber Attacks and Fraud
Already national crime for most countries is now 50% cyber, yet this is not being focused on by national police forces who don’t have the experience or systems to deal with this type of crime.  To take one example currently Londoners are losing an average of £26 million a month in cyber-attacks on businesses and individuals, Scotland Yard wants to reduce this crime but so far it’s attempts to reduce this crime is not working very well and UK cyber-crime is still rising.

Cyber Security Ventures:     Herjavec 2019 Cybercrime Report:

You Might Also Read: 

Easy Cyber Knowledge Ch.2: Deep Web And The Dark Web (£):

We Can Reduce Cybercrime, But Why Are We Failing?:

 

« Easy Cyber Knowldege Ch.4 The Internet of Things (IoT)
Confidential Data On 24.3m Patients Found Exposed Online »

Perimeter 81

Directory of Suppliers

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

WEBINAR: How to fuel your DevSecOps in AWS

WEBINAR: How to fuel your DevSecOps in AWS

Thursday, May 20, 2021 - In this webinar, SANS and AWS Marketplace will discuss how to build a strategy that encompasses visibility and automation for the DevSecOps pipeline in AWS.

GovCERT.HK

GovCERT.HK

Government Computer Emergency Response Team Hong Kong.

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

Cyber Security Audit Corp (C3SA)

Cyber Security Audit Corp (C3SA)

C3SA specializes in architecting, operating, managing and improving defensible and resilient IT infrastructures for Canada's public and private sectors.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

Binary Security

Binary Security

Binary Security's mission is to protect organisations and individuals from cyber-threats by providing quality, adaptive solutions using cutting edge knowledge and technologies.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.