Cyber crime and online fraud
Cyber crime is criminal activity that is carried out by using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of pounds from online bank accounts. Cyber crime also includes non-monetary offences, such as creating and distributing viruses on other computers or posting confidential business information on the Internet. Many are victims of this offence and find out once it is too late. Prevention is by far better than the cure, awareness and being very diligent in all online activities will go a long way to combating this crime.As many of you on social media know I work with some great policing teams bringing awareness of stories and events breaking UK. One that stands out and works incredibly hard in this field is my friends at Durham Police fraud team. The Twitter address for them is @DurhamFraud and I strongly suggest everyone follows this great resource. Perhaps the most prominent form of cyber crime is identity theft, in which criminals use the Internet to steal personal information from other users. Two of the most common ways this is done is through phishing and pharming, what is this? Both of these methods lure users to fake websites (that appear to be legitimate), where they are asked to enter personal information. This includes login information, such as usernames and passwords, phone numbers, addresses, credit card numbers, bank account numbers, and other information criminals can use to “steal” another person’s identity. Hard to believe that people fall for dummy web sites and give information freely but it happens. For example big brand names is a classic way some cyber criminals attack peoples identity, they create emails and banner adverts from well know high street names many they read name give up click link give up information to find out 3 days later their accounts have been compromised. For this reason, it is smart to always check the URL or Web address of a site to make sure it is legitimate before entering your personal information. Online verification services are available just Google search engine “Check URL hosting” But remember what we all quote @TakeFive (again follow on Twitter) meaning just take time to check senders emails and legitimacy of the sender. Because cyber crime covers such a broad scope of criminal activity, the examples above are only a few of the thousands of crimes that are considered cyber crimes. While computers and the Internet have made our lives easier in many ways, it is unfortunate that people also use these technologies to take advantage of others. Therefore, it is smart to protect yourself by using antivirus and spyware blocking software and being careful where you enter your personal information. Change passwords on all email accounts regularly, never give credit card details to a site you cannot verify, simple actions that can help deter the sickening feeling you get when your world is hacked! Cyber Crime and your Business As small and large businesses increasingly rely on new Internet technologies to remain competitive within the local and global marketplace, they are also becoming more susceptible to cyber crime attacks. Cyber crime can have a devastating impact on a small business, which often lacks the in-house technical expertise and resources to quickly and fully recover from cyber attacks. Small businesses can also even unknowingly aid in cyber crime by using unsecured computers, which cyber criminals can hijack and use to attack other online businesses; the economy’s life blood. While there are numerous technological steps small businesses can take to better secure their environments, IT infrastructure and controls alone are not effective in combating cyber fraud. Small business owners must also take steps to create a “culture of security” among both their employees and customers.Unfortunately, many small business owners are not currently taking such measures. In fact, only a little more than half of small business owners employ such simple precautions as requiring employees to sign security policies. Harsh, yes, but it’s your business you are protecting. By taking such basic steps as requiring employees to sign security policies, small business owners can establish expectations with employees about their role in protecting customer and company data and set the tone for a “culture of security” in the workplace.Below are some technological, daily routines and adjustments small business owners can make to better defend themselves against the serious threats posed by cyber crime. Assess risk and identify weaknesses As small business owners, you should analyse online and operating systems to determine the area’s most at risk. For example, is your customer data, internal accounting information and other sensitive data linked to the Internet? It should not be directly and always connected to the internet as this presents a huge risk, hackers love computers with accounts. As part of this risk assessment, you should also ensure that updated anti-virus programs, anti-spyware programs and firewalls are installed on all computers and that employees are required to change their passwords every 30 to 50 days. Microsoft market leaders in protection software offer security essentials as a free download – get it. Also add anti-malware recent global attacks highlighted so many failed in this simple low cost add-on. Most good quality anti-malware can be updated every 24 hours free of charge. All ways Back-up critical information You should establish a schedule to perform critical data backups and system upgrades on a regular basis throughout the year. Sad to say many do not until the horse has bolted! Shut that stable door before it’s too late! Creating back-ups on a regular basis ensures that critical data is not lost in the event of a cyber attack or natural disaster. Store all backup copies in remote locations away from the office, such as on an external hard drive, and encrypt any sensitive data about company or customers. Create a contingency plan You should also draft a contingency plan to follow if the business suffers a cyber attack. This plan should include steps on how to continue business operations at an alternate location when necessary. Be sure to test the plan annually. Have a computer or computers away from the business location somewhere safe like home, which contains everything you may need in the event of a disaster. Sounds irrational but we live in a modern society where events beyond our control can and do happen. Be prepared. Educate employees As I mentioned earlier education, knowledge, know how, being aware all helps to combat this crime against business and us personally. In order to create a culture of security, you must demonstrate to employees and customers that cyber\ fraud is a concern you take seriously. This involves educating employees and training them on proper Internet practices and technology solutions, as well as encouraging customers to protect themselves, as consumers, against cyber fraud. You should also integrate a cyber security roll out plan within the yearly business plan. This plan should also include steps for measuring success. Make the fact you have safe business practices a bonus point for staff. A case of beer or a free meal goes a long way to saying thank you.
End