By 2021 The Cost Of Cybercrime Will Be $6 Trillion

The worldwide cost cybercrime will be in excess of $6 trillion annually by 2021, up from $3 trillion in 2015, according to  Cyber Security Ventures

There are several factors that contribute to the prediction. In 2018, there were nearly four billion Internet users across nearly 1.9 billion websites this number is likely to rise toward six billion users by 2022

This is the 4th Industrial Revolution and like other revolutions it changes the individuals, economics, government and crime. 
This one employs deep data analysis with inter-connections and links to Bio-technology, Artificial Intelligence, robotics and the Internet of Things which will significantly alter us as humans and the places we work and live. 

When used well these processes ensure our security, as well as significantly improving the broader issues of global and national macro-economics, intelligence, law enforcement and geo-politics. When misused by criminals and cyber warfare activists this transformation has the potential for catastrophic outcomes and we are already experiencing these criminal attacks and crimes. 

Already, these arenas are being used by nations in a similar way that pirates were employed by nations to carry out theft and attacks on other nations shipping.  The Internet is being used in similar ways that oceans where employed for privateering, we are now seeing this in cyber-crime and cyber-warfare. 

The very nature of the Internet creates global collaboration is changing the way in which we view social connections and national borders. Now the modern globalised society is increasingly dependent on an array of organised and sometimes randomly interrelated electronic infrastructures. Many organisations and individuals see Cyber as a growing gossip and intellectually connected strategic and tactical policy network that has current and evolving opinion, news analysis, opportunity with significant security issues that can be used to steal and monitor individuals and organisational data.

Networks leave "exhaust" data, which relates to the activities and transactions of network traders and collaborators, which in turn tells us forensically much about what happened with the data’s use. We are unable to trap and reutilise this in the real world. But in the cyber world we can this is the powerful data that makes networks more efficient, customers better served, companies more knowledgeable. It is also a huge source of insecurity, and we have traded off these disadvantages against the upside until we can do so no more.

Cyberspace has transformed many areas of an organisation’s operational and commercial engagement. It is evolving from a technical and often complex ecosystem into a range of global and tactical actions to strategic system planning. These systems and their engagement require far more senior management understanding and involvement and cannot be left to the technologists. Senior management must engage and understand the strategic plans, commercial opportunities and security implications. 

Cyber has advanced from a professional IT specialty into a crucial critical strategic subject. This has affected everyone from school children, students, workers, spies, journalists, government officials, hackers, propagandists, fund-raisers, PR, company directors and terrorists. 

All forms of electronic connection, communication and attack have become digitised and radically transfigured into a new digital revolution, where different types of computers are becoming the new brain child of our culture. Just as the mechanisation of agriculture and then production took over the mussels and body of our workers so the computer begins to replace our brains.

The term cyberspace is used to describe systems and services connected directly to or indirectly to the Internet, telecommunications and computer networks. However, a useful way in which cyberspace can be visualised is a thin layer or nervous system running through many national and international sectors, enabling them to communicate, operate and function effectively. 

Cyber is changing our understanding and engagements with nationality and our traditional borders as the concept of country is beginning to be redefined. Cyber is altering the way we consider identity, our traditional concepts of hierarchy, beliefs and nationality. 

Cyber interconnection is also shifting our opinions and ideas of truth and authority and national borders present no barrier to cyber exchange and electronic crime both of which are on the increase. Therefore, the modern globalised society is increasingly dependent on an array of organised and interrelated electronic infrastructures and cyber opportunities and security is no longer a pure computer or IT technology issue and many governments and corporations see cyber security as a national policy matter. 

Cyber Attacks and Fraud
Already national crime for most countries is now 50% cyber, yet this is not being focused on by national police forces who don’t have the experience or systems to deal with this type of crime.  To take one example currently Londoners are losing an average of £26 million a month in cyber-attacks on businesses and individuals, Scotland Yard wants to reduce this crime but so far it’s attempts to reduce this crime is not working very well and UK cyber-crime is still rising.

Cyber Security Ventures:     Herjavec 2019 Cybercrime Report:

You Might Also Read: 

Easy Cyber Knowledge Ch.2: Deep Web And The Dark Web (£):

We Can Reduce Cybercrime, But Why Are We Failing?:

 

« Easy Cyber Knowldege Ch.4 The Internet of Things (IoT)
Confidential Data On 24.3m Patients Found Exposed Online »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Security Affairs

Security Affairs

Security Affairs is a blog covering all aspects of cyber security.

CipherPoint Software

CipherPoint Software

CipherPoint Software provides data-centric auditing and protection solutions for securing unstructured information

Cyber 360

Cyber 360

Cyber 360 is a Cybersecurity contract and fulltime placement firm dedicated to identifying and hiring Cybersecurity professionals.

Cybereason

Cybereason

Cybereason provides real-time detection of malicious activity enabling you to identify the cause and scope of an attack and ensure an effective response.

CERT-UA

CERT-UA

CERT-UA is the national Computer Emergency Response Team for Ukraine.

Raz-Lee Security

Raz-Lee Security

Raz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers.

Khipu Networks

Khipu Networks

Khipu Networks is an award winning Cyber Security Company delivering a wide range of network, wireless and security solutions, technologies and services across multiple sectors.

Sikur

Sikur

Sikur have developed a communication platform that sets new boundaries for corporate privacy and security.

Rigado

Rigado

Rigado's mission is to enable commercial IoT success by providing high-performance secure and scalable wireless edge connectivity and network infrastructure.

NOW Insurance

NOW Insurance

NOW Insurance provides small business owners and other professional classes with a seamless purchasing experience for general liability, professional liability, and cybersecurity insurance coverage.

OwnBackup

OwnBackup

OwnBackup proactively prevents you from losing mission-critical data and metadata with automated backups and rapid, stress-free recovery.

BlueHalo

BlueHalo

BlueHalo is purpose-built to provide industry capabilities in the domains of Space Superiority and Directed Energy, Missile Defense and C4ISR, and Cyber and Intelligence.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

RevealSecurity

RevealSecurity

RevealSecurity's TrackerIQ detects malicious activities in enterprise applications.

Infosec Institute

Infosec Institute

Infosec is a leading cybersecurity training company, we help IT and security professionals advance their careers with skills development and certifications.

Redpoint Cybersecurity

Redpoint Cybersecurity

Redpoint Cybersecurity is a human-led, technology-enabled managed cybersecurity provider specializing in Digital Forensics, Incident Response and proactive cyberattack prevention.