Cybercrime In Britain Does Serious Harm

In very basic terms, cyber crime involves a computer, mobile or iPad. It is often hacking for money, or secret data about you or people and organisations you are connected to or it might be identity theft or child pornography and other reasons.  
 
 A British study into victims of computer crime carried out by Action Fraud has exposed the serious harm some victim’s experience, as well as barriers to reporting such offences.  Changes throughout the entire system are being recommended to better serve the needs of victims, and help protect others in the future. 
 
More than £190,000 a day is lost in the UK by victims of cyber-crime, police statistics show. The figures show 13,357 people in the UK reported cyber-crimes over a six-month period. More than 5,000 of those people were hacked via their social media and email accounts, costing victims £14.8m. 
 
More than a third of victims in that period fell prey to the hacking of social media and email accounts. Computer misuse involves hacking, denial of service attacks and ransomware. In the year ending 2018 it accounted for almost 10% of reported crime in the UK.
 
Researchers have found that there is poor research of computer misuse crime by UK authorities and now there are these 3 recommendations for reporting. 
 
1. The UK’s reporting systems have been a barrier to some reporting of crime, and recommends that this is up-graded. 
 
2. A review of information on all police force websites about computer misuse crime is also being advised, to ensure a consistency of reporting of such crimes across the country.  Researchers found that all police officers, staff and the public should be better trained in understanding what constitutes a Computer misuse and crime offence.
 
3. It is also recommended the National Cyber Security Centre works with key organisations who receive complaints from customers, including banks and social media providers, to encourage victims to report crime through common web links.
 
As the number of computer misuse crimes in 2018 was nearly a million yet less than 24k were actually recorded in the UK – as yet there are not any official statistics for 2019. The report recommends that victims should always report crime via their local police station.
 
Adults aged between 35 and 44 are slightly more likely to be victims of cybercrime (by around 7.4%). This is in comparison to 16 to 24-year-olds (4.9%), 65 to 74-year-olds (5.4%) and over 75 (2.8%). Households with incomes of more than £50,000 per year have a slightly higher risk than those below that threshold. This could be due to the fact that more affluent households tend to have more internet-connected devices.
 
Managers and professionals such as doctors and lawyers have a slightly higher chance of being victims of cyber-crimes.
Given that so few cybercrimes are actually prosecuted, protecting yourself from cyber-crime is key. 
 
Here are Six Key Cyber Security Points to follow:
 
  • Ensure that your devices are password protected with a strong password. The City of London Police, has warned people to keep separate passwords for online accounts.
  • Should any of your devices be stolen that you can quickly change account passwords. 
  • Be aware of your surroundings, make sure that no one is looking over your shoulder or watching as you type in passwords.
  • Do not click or anything or download anything unless you are 100% confident in the source.
  • Do not reply to emails asking for personal information or passwords. If an authority, perhaps your bank, asks for information over email, call your branch and ask for confirmation that they actually need this data.
  • Do not give out personal information, even something as simple as your address, unless you absolutely know that data is going somewhere trustworthy.
Remember,  cyber crime happens every day, and it happens to people just like you. No one is safe, though you can lessen your chances of being affected by following the advice given above.  Be alert, be vigilant, and be careful so that you don’t become a statistic!
 
BBC:       FSMatters:        Computer Weekly:    University of Portsmouth:     Tiger Mobiles
 
You Might Also Read:
 
Cyber Crime Cost UK Businesses £87billion:
 
« WEBINAR: How to achieve security visibility at scale in the AWS Cloud
Belarus Government Shut Off The Internet During Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: Navigating cloud security: The importance of posture management tools

ON-DEMAND WEBINAR: Navigating cloud security: The importance of posture management tools

Watch this webinar to see how cloud security posture management (CSPM) tools can fit into your cloud security strategy.

tunCERT

tunCERT

TunCERT is the National Computer Emergency Response Team of Tunisia.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

SiteLock

SiteLock

SiteLock is a global leader in website security solutions. We provide affordable, cybersecurity software solutions designed to allow small to midsize businesses to operate without fear of an attack.

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

Secardeo

Secardeo

Secardeo is a provider of corporate solutions using digital signatures and certificates. Our solutions enable the user transparent end-to-end encryption of e-mails between organizations.

VivoSecurity

VivoSecurity

VivoSecurity is a pioneer in cyber risk quantification based on data science. Our products and services help organizations achieve optimal information security and GRC programs.

Spire Solutions

Spire Solutions

Spire Solutions is the Middle East & Africa region’s leading cybersecurity solution provider and value-added distributor (VAD).

VIBE Cybersecurity International

VIBE Cybersecurity International

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC).

IT Search

IT Search

IT Search is a specialist IT recruitment company focusing on Cyber Security, IT Infrastructure, Software, Data, Digital Transformation and C Suite leadership positions.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

Finnish Security & Intelligence Service (SUPO)

Finnish Security & Intelligence Service (SUPO)

The Finnish Security and Intelligence Service is a government agency tasked with combating serious threats to national security in Finland.

Oxford Internet Institute - University of Oxford

Oxford Internet Institute - University of Oxford

The Oxford Internet Institute is a multidisciplinary research and teaching department of the University of Oxford, dedicated to the social science of the Internet.

Ciphertex Data Security

Ciphertex Data Security

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems.

Corsearch

Corsearch

Combining AI-powered technology and decades of industry expertise, Corsearch is revolutionizing how companies establish and protect their brands.

Cytidel

Cytidel

Cytidel is a vulnerability and risk management platform that utilises threat and business intelligence to help IT Security teams.

Haiku

Haiku

Haiku stands at the forefront of cybersecurity upskilling, leveraging video games to immerse you in a flow state for accelerated, enduring learning.