Cyber Crime In Britain

There has been a significant growth in cyber criminality in the form of high-profile ransomware campaigns over the last year, according to the British National Crime Agency. 
 
Breaches leaked personal data on a massive scale leaving victims vulnerable to fraud, while lives were put at risk and services damaged by the WannaCry ransomware campaign that affected the NHS and many other organisations worldwide. 
 
Tactics are currently shifting as businesses are targeted over individuals and although phishing attacks on individuals are increasing, fewer are falling victim as people have become more alert. Because the distinction between nation states and criminal groups is increasingly blurred, cyber-crime attribution is sometimes difficult. 
 
Many Russian-speaking cyber groups are threatening UK interests, but home-grown cyber criminals are becoming more sophisticated and therefore a rising threat. 
 
Although young criminals are often driven by peer kudos rather than financial reward, organised UK cyber-crime groups are motivated by profit. Cyber criminals seek to exploit human or security vulnerabilities in order to steal passwords, data or money directly. 
 
The most common cyber threats include:  
 
• Hacking - including of social media and email passwords
• Phishing - bogus emails asking for security information and personal details
• Malicious software, including ransomware through which, criminals hijack files and hold them to ransom
• Distributed denial of service (DDOS) attacks against websites – often accompanied by extortion
 
The scale and complexity of cyber-attacks is wide ranging. 'Off the shelf' tools mean that less technically proficient criminals are now able to commit cyber-crime, and do so as awareness of the potential profits becomes more widespread. 
The evolving technical capabilities of malware means evolving harm as well as facilitating new crimes, such as the crypto-mining malware which attacks digital currencies like Bitcoin.  
 
Cyber-attacks are financially devastating and disrupting and upsetting to people and businesses. We know that there is significant under-reporting, although the new General Data Protection Regulation is likely to prompt a better picture of scale. 
Currently the level of sentencing at court is not commensurate with the seriousness of attacks, and this is an area which is ripe for consideration.
 
How you can Help
Most cyber-attacks could be prevented by taking these basic security steps: 
 
• Choose strong passwords and don’t reuse them for multiple logins
• Install security software such as anti-virus and two-factor authentication. This kind of software is often available for free.
• Keep all security software and operating systems updated (this can be set to update automatically)
 
For further advice on how to stay safe online please visit Cyber Aware, Get Safe Online or the National Cyber Security Centre .
 
National Crime Agency
 
You Might Also Read: 
 
Brexit Threatens Cybercrime Detection:
 
 
 
 
« Best UK Cyber Jobs Without A Degree
Securing Your Organisation’s Office 365 Environment »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

OSSEC

OSSEC

OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS).

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

Nexis

Nexis

Nexis GmbH is a German IT security company specializing in IAM, access control, and risk management.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

BullGuard

BullGuard

BullGuard is an award-winning cybersecurity company focused on providing the consumer and small business markets with the confidence to use the internet in absolute safety.

Evina

Evina

Evina offers the most advanced cybersecurity and fraud protection for mobile payment.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

Laminar

Laminar

Laminar provides the only Public Cloud Data Protection solution that provides full visibility and enforcement capabilities across your entire public cloud infrastructure.

Alpha Mountain AI (alphaMountain)

Alpha Mountain AI (alphaMountain)

alphaMountain provides up-to-date domain and IP intelligence for cybersecurity investigational and protection platforms.

Kiteworks

Kiteworks

Kiteworks (formerly Accellion) creates a dedicated Private Content Network that ensures zero-trust private content protection and compliance.

Valimail

Valimail

Valimail delivers the only complete, cloud-native platform for validating and authenticating sender identity to stop phishing, protect and amplify brands, and ensure compliance.

Opus

Opus

Opus dramatically reduces cloud security risks by enabling teams to define, orchestrate, automate and measure remediation processes across the entire distributed organization.

TachTech

TachTech

TachTech is passionate about trust, security and privacy in the digital world. We create tailored security and compliance solutions to improve your business.

CyTwist

CyTwist

CyTwist is an early warning attack detection platform that complement your existing security suite and provides your security teams with unique detection capabilities of stealth targeted attacks.

HeroDevs

HeroDevs

HeroDevs is the trusted leader in providing secure, long-term support for deprecated open-source software.