{"id":5153,"date":"2017-07-11T08:19:59","date_gmt":"2017-07-11T13:19:59","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=5153"},"modified":"2017-07-06T08:33:10","modified_gmt":"2017-07-06T13:33:10","slug":"is-cybercrime-on-the-increase","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/is-cybercrime-on-the-increase\/","title":{"rendered":"Is Cybercrime on the increase?"},"content":{"rendered":"<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2017\/07\/cyber-criminal.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5155 alignleft\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2017\/07\/cyber-criminal.jpg\" alt=\"\" width=\"300\" height=\"200\"><\/a>In recent months, a significant amount of media coverage has been given to the plight of high-profile organisations falling prey to cyber-attacks of rapidly increasing sophistication and severity. With this in mind, you would be forgiven for thinking that there is something of an epidemic in cyber-crime at present. But is this really the case, or is this a prime example of saturation media coverage being responsible for creating unnecessary mass hysteria?<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Unfortunately, cybercrime really is on the increase<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"https:\/\/www.theguardian.com\/uk-news\/2017\/jan\/24\/uk-fraud-record-cybercrime-kpmg\" rel=\"nofollow\" target=\"_blank\">Recent statistics<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> indicate that cybercrime really is increasing at a rapid rate. While media reports concentrate on well-known \u2018super-cases\u2019 causing serious harm to high-profile public and private sector organisations, the man on the street is also incredibly vulnerable when it comes to being the subject of a cybercrime. Incredibly, in the UK alone it is estimated that cybercrime accounts for <a href=\"https:\/\/www.theguardian.com\/uk-news\/2016\/jul\/21\/crime-rate-online-offences-cybercrime-ons-figures\" rel=\"nofollow\" target=\"_blank\">as much as 40%<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> of all recorded criminal incidents \u2013 with one in ten people having fallen victim to cybercrime at some point. It is also likely that the vast majority of smaller scale cybercrime incidents \u2013 which tend to affect individuals rather than companies \u2013 goes unreported. Reasons for non-reporting can be due to factors such as failure to recognise an attack as a crime, embarrassment at having fallen victim to a scam, or not wanting to waste the authorities\u2019 time with a \u2018virtual\u2019 rather than real life crime. All told, unfortunately cybercrime is here to stay and shows no sign of dissipating.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Why is cybercrime increasing at such a rate?<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">There are a whole host of factors which contribute to the continued rise in cybercrime. Three of the most significant factors are outlined below:<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\">1. Opportunity<\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Since the advent of the internet, its scope has broadened tremendously. The internet is firmly embedded in the vast majority of people\u2019s lives and we now use it in ways which were incomprehensible 25 years ago. We utilize the internet to shop, bank, pay our taxes and as a primary method of communication. Given the billions of transactions worldwide which occur on the internet every day, cybercriminals have a high degree of opportunity and it only takes the tiniest lapse in security for them to exploit a weakness in an organisation or individual\u2019s online protection. In addition, there are no physical barriers to prevent the committing of online crime \u2013 with an individual located in the UK being perfectly capable of launching an attack on systems located in the USA, Australia or China.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\">2. Inability of the authorities to keep up<\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">New types of attack are emerging all the time. Gone are the golden days of simply stealing account numbers by hacking into an online banking app and hoping that you are able to extract money before the unfortunate victim is aware of the attack. With malware, ransomware, phishing, rogue software and password attacks to name but a few, it is increasingly difficult for cyber law enforcement experts to keep up with increased diversity and sophistication of attacks. Our laws were also founded at a time when crimes were entirely physical, so in addition to the authorities being unable to keep up with the evolution of cyber-crime methods, the legal process is playing catch-up too.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\">3. Lack of consequences for online criminals<\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Even with the most sophisticated and dedicated cybercrime investigators on the case, it is still incredibly difficult to bring the perpetrators of this type of crime to justice. By their very nature cyber criminals are highly intelligent and expert in creating and refining new attack techniques. They are also skilled and making themselves hard to trace and so can become virtually invisible.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Even in those cases where the perpetrator can be identified the legal process faces significant challenges. Cyber-criminals operate across international borders, meaning that unless there is a reciprocal legal agreement in place between countries (and the country harbouring the criminal is prepared to extradite the perpetrator \u2013 often a <a href=\"http:\/\/www.bbc.co.uk\/news\/uk-england-suffolk-39705812\" rel=\"nofollow\" target=\"_blank\">frustrating and sometimes futile<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> exercise), making the criminal face the legal process in the country affected by the crime is exceptionally difficult. Add to this the fact that gathering concrete evidence of a cyber-crime is exceptionally difficult, and the chances of a successful prosecution are slim. Of course, sophisticated online criminals are aware of this, so there is very little deterrent when it comes to committing these types of crime.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">A gloomy outlook?<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">It seems a depressing picture, but there really is no need to despair. Most high profile cyber-attacks have worked by exploiting an easily fixable glitch in an organisation\u2019s security protocol \u2013 think the failure of NHS organisations to update their Windows security profile. <a href=\"https:\/\/www.forbes.com\/forbes\/welcome\/?toURL=https:\/\/www.forbes.com\/sites\/realspin\/2014\/02\/07\/5-ways-to-protect-yourself-from-cyber-attacks\/\" rel=\"nofollow\" target=\"_blank\">Taking basic steps to protect yourself<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> really does go a long way to reversing the increase in cybercrime. In addition, countries and authorities worldwide are starting to better understand the damaging nature of cyber-attacks and the importance of <a href=\"http:\/\/www.computerweekly.com\/feature\/European-law-enforcement-seeking-smart-ways-to-fight-cyber-crime\" rel=\"nofollow\" target=\"_blank\">working together to combat cyber-crime.<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>\u00a0There are also powerful <a href=\"https:\/\/www.poweradmin.com\/blog\/cryptolocker\/\">software to detect ransomware<\/a>, malware and other cyber crimes in progress. Hopefully, in the not too distant future, the authorities will finally get ahead of the game, and there will come a time when cyber-criminals will no longer be able to hide in the shadows.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent months, a significant amount of media coverage has been given to the plight of high-profile organisations falling prey to cyber-attacks of rapidly increasing sophistication and severity. With this in mind, you would be forgiven for thinking that there is something of an epidemic in cyber-crime at present. But is this really the case, [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":5155,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,6],"tags":[],"class_list":["post-5153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-tech"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=5153"}],"version-history":[{"count":2,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5153\/revisions"}],"predecessor-version":[{"id":5157,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5153\/revisions\/5157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/5155"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=5153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=5153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=5153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}