We Can Reduce Cybercrime, But Why Are We Failing?

We always ignore the long-written terms and conditions and  check the sign on “I agree to…..:” Sadly our attitude towards cybersecurity is somehow the same.  
 
Maybe it’s our overconfidence that we aren’t beneficial to cyber criminals or lack of understanding, or capabilities to deal with rising cybercrime; whatever it is, the fact is - we are still failing in protecting our cyber world.
 
So, how about looking at what we now call cybercrime with a magnifying glass intending to combat or at least limit the malicious practices of those mal-practitioners.  Let’s begin how cybercrime evolved! 
 
The beginning of Cybercrime
 
Back in 1970-1995 Kevin Mitnick - the most notorious and groundbreaking hacker in the history of the internet, long before all the other script kiddies showed up on the scene.
 
Mitnick penetrated some of the high-profile networks of the world using social engineering schemes, tricked insiders into access codes and passwords; that was something we now call malware and it’s highly automated.
 
Walking in 1988, the Morris Worm showed up; what started as a small playful exercise launched from MIT, the worm spread faster than anticipated. It went so bad that Robert Morris became the first violator of the Computer Fraud & Abuse Act.
 
It was 2011, when things were shifted into high gear. The most-hyped - Stuxnet Worm, become the world’s first weaponized attack, targeted Iran’s nuclear program, and physically damage their enrichment centrifuges. This was not an act by a prankster, a lone hacker, or script kiddie, but was the work of a Nation State.
 
Another significant change we witnessed in 2011 was the emergence of social media in full swing; another platform for hackers to publicize their work. The LulzSec group hacked and tweeted about their victim’s, then hacked Sony’s PlayStation network in the event that compromised over 77 million users’ information. At that time, most operating systems and even the internet was not aware of strong security.
 
If you ask me the timeline of the internet in a few words, then I would suggest you listen to what Leonard Kleinrock - a professor of computer science at UCLA - said in an interview:
 
“There's a very dark side to the Internet, which we're all familiar with. It started with a worm in 1988, and it became spam in 1994, and now we have pornography, we have denial of service [attacks], we have identity theft, we have fraud, we have things like botnets pieces of software that cyber thieves use to remotely and secretly control your computer, which really worry me.”
 
Aren’t his words true? We all agree with what he said but still not acting accordingly. 
 
The current state of Cybercrime - The Internet become limitless, so does our control
 
So, we have this global network that was never intended to be secure, then suddenly back in 2000 the ‘dot com’ boom appeared on the screen, letting everyone reaching the surface of the internet. 
 
It was the same time when E-commerce comes into existence; we’ve started our medical records, educational records, military secrets, and banking credentials online.
 
Everything is now online: Did I mention that all of this was on a network that was never designed to be secure?
 
What if I ask:  Has our greed played any role in cybercrime problem? Does security exist in a quest to make as much money as possible? Is security too inconvenient for users?
 
Think in this manner: For the first time in history anyone can rob a bank in the US from Russia or anywhere in the world without leaving their cozy home or office; thanks to the Internet for connecting any computer with any other computer in the world.
 
Think about targets…
 
Cyber criminals can not only snoop on our baby monitors and home security systems but also compromise our bank accounts and much more. The most phenomenal data breaches include Target, the US Government’s OPM, Adobe, Sony, Home Depot, Yahoo, Equifax, eBay, Anthem, Marriott, and CapitalOne,  to name some more notable and newsworthy. Did I mention hospitals, where ransomware can shut down access to critical life-saving machines and systems? 
 
Interestingly, there are 4,383,810,342 users using the Internet of Things (IoT)  across 7 billion internet-connected devices and the total number of records breached since 2005 is 11,578,188,519.
 
Let me present you a quick overview of the increasing numbers of the current state of cyber warfare; thanks to Verizon:
 
When you hear about data breaches, you’ll lose count. It’s become so commoditized that when someone announce another data breach, it feels like saying there’s another accident of Interstate I-4 in Florida. 
 
In simple words, it’s become a routine, making us numb to it as violence on the evening news.
 
If we keep ignoring, we might be the next target, then we will be left with nothing but regrets; cure is desirable but prevention is better than cure. 
 
It’s the right time to face those unknown cheapsters and take control of our very-own cyber world in our hands; if we want our kids to be safe from future cyberwarfare.
 
The only solution: Let’s work together… like the cybercriminals do.
 
I can’t and won’t address to all nations, but for our home country - the USA. 
 
Though it sounds siloed, but steps had to be taken, because it’s not hurting the victims alone, but the entire economy. In Europe, privacy is a human right and sadly, it’s not even mentioned in our Constitution (you will only find in the 4th Amendment under illegal search and seizure).
 
Another issue to be addressed at our earliest regarding the secure of our data are is the unknown data brokers. 
 
We all know that data brokers have free reign in the US - as profits are more important to Congress than privacy. Our lobbyists often from the government and work for corporations, including data brokers who in return fund congressional elections. This gives them some power to manipulate our government and laws.
 
Recently I heard that the US Congress conducting a hearing on data brokers and its impact on credit insurance, financial data privacy, employment and housing; forget what Snowden or Assange say our government has on us. 
 
It’s time our government should move toward uniformity of laws; California and Massachusetts have their data privacy laws, while others have little to none, and the feds go another direction. This siloed approach guarantees that we will shortly come up.
 
We are glad that government pushed electronic medical records, but don’t you think it was another example of too much too fast; they themselves became victims - OPM data breach, in which everyone including the FBI director’s identity was compromised. 
 
Do you know, according to HIPAA Journal, there were 2,546 healthcare data breaches occurred between 2009-2018, resulting in the theft or exposure of 189,945,874 records.
 
In short, the same government that cannot secure its own security clearances was and is simultaneously pushing us to be online to get ready for the taking.
 
Let’s face it!
 
Microsoft keeps adding patches on their OS, too many people are spending too much time defending it and looking for ways to exploit it, but we are losing this battle.  We know where we’ve been, and where we are: sadly still in reactive mode with no comprehensive laws to address cyber security and privacy across our nation. 
 
Are we kicking the cybersecurity can appropriately?
 
Yes, we are, but with so little progress and pace; as our US Congress is too busy fighting itself, I wish this partisan politics vanish forever, otherwise cyber criminals who don’t work in silos will still continue to exploit our medical records, banks, military secrets and intellectual property/ies.
 
So, what exactly we should do?
 
● We need real world solutions to manage the growing risk, combining industry executives and experts.
● We need uniform laws and security frameworks for everyone to adopt.
● We need to bring all the states (those investing in cybersecurity and those who are not) to deal with the issue collectively.
● We have come up with regulations, that all the industries supposed to oblige to. 
● We need consistent and comprehensive mandatory security and privacy laws and respective compliance frameworks to meet them. 
● We should also need to work with the European Union and adopt GDPR
 
If constitution is unwilling to address data privacy, it should at least be a human right – especially in this digital age.
 
In the end, we must decide: are we serious about cybersecurity and privacy, or will we continue moving down the path of ignorance and survival in a global game of cybercrime that is active 24 x 7 to take everything from us?
 
We can do the right thing. Can’t we? 
 
Devin Smith writes on  cyber security and technology-related crime at ReviewsDR.         
 
You Might Also Read:
 
One Costly Minute Of Cybercrime:
 
 
« Do Criminals Dream Of Electric Sheep?
The Cyber Effect On Modern Warfare »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

QMS International

QMS International

QMS is one of the leading ISO certification bodies in the UK and serves clients worldwide.

MyCERT

MyCERT

MyCERT is the National Computer Emergency Response Team of Malaysia.

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

ControlCase

ControlCase

ControlCase provide solutions that address all aspects of IT-GRCM (Governance, Risk Management and Compliance Management).

Wooxo

Wooxo

Wooxo provides business security and continuity solutions to protect business data for organisation of all sizes.

HYPR

HYPR

HYPR Decentralized Authentication minimizes the risk of enterprise data breaches while providing an enhanced user experience for your customers and employees.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

Renesas Electronics

Renesas Electronics

Renesas Electronics delivers trusted embedded design innovation with solutions that enable billions of connected, intelligent devices to enhance the way people work and live - securely and safely.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

ARCON

ARCON

ARCON offers a proprietary unified governance framework, which addresses risk across various technology platforms.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

Splashtop

Splashtop

Splashtop’s cloud-based, secure, and easily managed remote access solution is increasingly replacing legacy approaches such as virtual private networks.

StepSecurity

StepSecurity

StepSecurity provides a comprehensive security platform for GitHub Actions.

TraitWare

TraitWare

The TraitWare mission is to increase user and company security while simplifying access to digital and physical resources through the elimination of the need for usernames and passwords.

Phone Monitoring Service

Phone Monitoring Service

Phone Monitoring Service provides cyber security services, ethical hacking services, social media hacking services in the USA, Canada, Europe.

Accompio

Accompio

Accompio offer comprehensive support in the digitalisation of your business processes.