SlideShare uma empresa Scribd logo
1 de 5
Cybercriminals Are Lurking
According to Go-Gulf.com, more than 556 million people were victims of cybercrime worldwide
in 2013. That equals 1.5 million victims per day and 18 victims per second. Motivational factors
behind cybercrime include political gain, revenge, and cyber espionage or cyber warfare.
These faceless cybercriminals are either members of terrorist groups, disgruntled employees,
someone seeking serious pay days or people without a conscious. Terrorist groups such as Isis
are recruiting young computer hackers with top level security clearances to wage cyberwar on
U.S. intelligence agencies. Vulnerable targets include telecommunications systems, energy grids,
and air gapped military networks that are not directly connected to the Internet.
Criminal Intent
An April 2015 article published by the New Zealand Herald, states that Islamic cyber groups
used laptops to hack the New York Times, the Financial Times, and other websites critical to the
regime of Syrian President Bashar al-Assad. Hiding under a bed of buried online data, these
dangerous, yet unknown faceless creatures of mass destruction are waging a new kind of war on
terror.
Cybercriminals are collecting your social security numbers, healthcare records, security codes,
pin numbers and financial records in an attempt to line their pockets, while crippling our nation’s
economy. Financial institutions are one of the most vulnerable operations to potential a
cyberattack. Savvy hackers knows as “crackers” are capable of breaking into a banking network
without authorization. They’re intent? Financial gain and determination to wreak havoc and
cause chaos. Customers’ financial records are potentially suspect to fraudulent actively and
banks would be fiscally responsible for reimbursing their customers. This could put a monetary
strain on larger financial institutions directly affecting the way business is conducted on Wall
Street and potentially crippling our nation’s economy.
Victimized
According to a November 2014 Federal Bureau of Investigation report, more than 6,800
complaints of cybercrime where reported by the Internet Crime Complaint Center totaling more
than $20 million dollars from 2009 to 2014.
Victims are often enticed by an e-mail offering or banner advertisements from a cybercriminal
that peaks the interest of the consumer. E-mails usually contain viruses also known as malware,
logic bombs, adware, or ransomeware, which directly attack your computer making it inoperable
until you pay the cybercriminals a fee.
Safe and Secure
So how do Americans protect themselves from becoming a victim of cybercrime? According to
a WHBF News, a TV station in Davenport Iowa, those of us who use the Internet on a regular
basis should limit what personal information we share with others, password protect their mobile
phones, and refrain from sharing too much information on social sites.
While on the surface this sounds like reasonable sound advice, cybercriminals are finding ways
to remain one step ahead of the curve. Crafty and sneaky tactics make it almost impossible to
prevent cybercriminals from accessing information from just about anywhere in the world.
Wikihow.com offers two basic tips for helping you to protect yourself from a cybercrime beyond
just limiting what information is shared with others online.
1. Type all links directly into your web browser instead of directly clicking on an e-mail
link. Clicking on links, either in e-mails or on social sites can be a trap to obtain your
username and password.
2. Take the time to learn how cyber criminals work through e-mail, malware, and spyware
operating systems.
It is your responsibility to make sure that there are necessary security measures in place to help
prevent a cybercrime from occurring. Think about incorporating a strategic plan that calls for
security passwords to be guarded and protected. Write them down some where and keep them
OFF line. Your employees’ access to work related material should be restricted or encrypted and
inaccessible from Wi-Fi hot spots. If possible, have a team of security experts continually
monitor all online activity that prevents malware from spreading viruses throughout your
company databases.
Aliah Wright, an expert on digital communications and author of the book, “A Necessary Evil:
Managing Employee Activity on Facebook, Twitter, LinkedIn … and the Hundreds of Other
Social Media Sites,” says employers should “train their employees to think before they click.
Consider the source. For example, ask them to consider first why someone may send them
information they did not request and to Google news items that sound outrageous before clicking
on them from a Facebook page.
“Malware lives across the Internet—not just on social sites or in e-mails,” she said. “Be savvy
about the things you share online and the items you click on as well.”
While we are all potential victims of cybercrime, it make sense to take the precautionary
measures to protect ourselves from the possibilities of it happening to you and your company.

Mais conteúdo relacionado

Mais procurados

HE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceHE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSource
Brian Arellanes
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Blake A. Klinkner
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
computer crime
computer crimecomputer crime
computer crime
00jitesh00
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 

Mais procurados (19)

HE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceHE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSource
 
How secure are you?
How secure are you?How secure are you?
How secure are you?
 
Social Media & Cybersecurity
Social Media & CybersecuritySocial Media & Cybersecurity
Social Media & Cybersecurity
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 
Cyber security
Cyber security Cyber security
Cyber security
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
computer crime
computer crimecomputer crime
computer crime
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 

Semelhante a Cybercriminals Are Lurking

Semelhante a Cybercriminals Are Lurking (20)

Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 

Último

Último (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Cybercriminals Are Lurking

  • 1. Cybercriminals Are Lurking According to Go-Gulf.com, more than 556 million people were victims of cybercrime worldwide in 2013. That equals 1.5 million victims per day and 18 victims per second. Motivational factors behind cybercrime include political gain, revenge, and cyber espionage or cyber warfare. These faceless cybercriminals are either members of terrorist groups, disgruntled employees, someone seeking serious pay days or people without a conscious. Terrorist groups such as Isis are recruiting young computer hackers with top level security clearances to wage cyberwar on U.S. intelligence agencies. Vulnerable targets include telecommunications systems, energy grids, and air gapped military networks that are not directly connected to the Internet. Criminal Intent An April 2015 article published by the New Zealand Herald, states that Islamic cyber groups used laptops to hack the New York Times, the Financial Times, and other websites critical to the regime of Syrian President Bashar al-Assad. Hiding under a bed of buried online data, these dangerous, yet unknown faceless creatures of mass destruction are waging a new kind of war on terror.
  • 2. Cybercriminals are collecting your social security numbers, healthcare records, security codes, pin numbers and financial records in an attempt to line their pockets, while crippling our nation’s economy. Financial institutions are one of the most vulnerable operations to potential a cyberattack. Savvy hackers knows as “crackers” are capable of breaking into a banking network without authorization. They’re intent? Financial gain and determination to wreak havoc and cause chaos. Customers’ financial records are potentially suspect to fraudulent actively and banks would be fiscally responsible for reimbursing their customers. This could put a monetary strain on larger financial institutions directly affecting the way business is conducted on Wall Street and potentially crippling our nation’s economy. Victimized According to a November 2014 Federal Bureau of Investigation report, more than 6,800 complaints of cybercrime where reported by the Internet Crime Complaint Center totaling more than $20 million dollars from 2009 to 2014.
  • 3. Victims are often enticed by an e-mail offering or banner advertisements from a cybercriminal that peaks the interest of the consumer. E-mails usually contain viruses also known as malware, logic bombs, adware, or ransomeware, which directly attack your computer making it inoperable until you pay the cybercriminals a fee. Safe and Secure So how do Americans protect themselves from becoming a victim of cybercrime? According to a WHBF News, a TV station in Davenport Iowa, those of us who use the Internet on a regular basis should limit what personal information we share with others, password protect their mobile phones, and refrain from sharing too much information on social sites.
  • 4. While on the surface this sounds like reasonable sound advice, cybercriminals are finding ways to remain one step ahead of the curve. Crafty and sneaky tactics make it almost impossible to prevent cybercriminals from accessing information from just about anywhere in the world. Wikihow.com offers two basic tips for helping you to protect yourself from a cybercrime beyond just limiting what information is shared with others online. 1. Type all links directly into your web browser instead of directly clicking on an e-mail link. Clicking on links, either in e-mails or on social sites can be a trap to obtain your username and password. 2. Take the time to learn how cyber criminals work through e-mail, malware, and spyware operating systems. It is your responsibility to make sure that there are necessary security measures in place to help prevent a cybercrime from occurring. Think about incorporating a strategic plan that calls for security passwords to be guarded and protected. Write them down some where and keep them OFF line. Your employees’ access to work related material should be restricted or encrypted and inaccessible from Wi-Fi hot spots. If possible, have a team of security experts continually monitor all online activity that prevents malware from spreading viruses throughout your company databases.
  • 5. Aliah Wright, an expert on digital communications and author of the book, “A Necessary Evil: Managing Employee Activity on Facebook, Twitter, LinkedIn … and the Hundreds of Other Social Media Sites,” says employers should “train their employees to think before they click. Consider the source. For example, ask them to consider first why someone may send them information they did not request and to Google news items that sound outrageous before clicking on them from a Facebook page. “Malware lives across the Internet—not just on social sites or in e-mails,” she said. “Be savvy about the things you share online and the items you click on as well.” While we are all potential victims of cybercrime, it make sense to take the precautionary measures to protect ourselves from the possibilities of it happening to you and your company.