21st Century Cybercrime – The Evolution Of Protecting Your Data

“21st Century Cybercrime – The Evolution of Protecting Your Data”

cloud-security-infographic

The relentless development of technology has facilitated an increase in cybercrime, affecting individuals and businesses in different ways and to differing degrees. Since the advent of the internet the protection of data has been of paramount importance, however, the development of various technologies has made the protection of data more and more difficult to ensure. In the UK alone, cybercrime was found to cost organisations on average £2.1million per year with an average of 41 cyber-attacks per week.

Back when the internet age was still young, cybercrime was hacker led, largely committed by individuals hoping to prove the existence of glitches in operating system. An example of such was Moonlight Maze when hackers targeted military information held by the Pentagon. Proving the glitch was an end in itself.

As technology has advanced, however, cybercrime has become the domain of organised gangs seeking financial gain from their crimes. The cybercrime network is today a legitimate and sophisticated business with technical innovators at the top.

Information Theft

Information theft is increasingly common, with gangs infiltrating computer systems in order to extract the personal data of users. One headline grabbing infiltration occurred in 2011 when marketing giant Epsilon had their email lists hacked; those lists comprised customers of large firms such as Citibank and JP Morgan. The criminals used these email addresses for phishing.

The development of third party cloud storage technology has assisted cyber criminals as large batches of data are now so often stored within one cloud. It is essential that companies separate out their data across multiple storage options. Experts have indeed highlighted that cloud data is especially prone to crime due to a lack of security measures. For personal cloud storage it is essential to protect your data by using two-step verification if it is available.

Smart Phones

The continued technological advancement of smart phones also poses an opportunity for cyber criminals. Criminals employ those techniques used on PCs alongside new smart phone specific approaches. In particular, social networking apps which hold a wealth of personal information which are often exploited by cyber criminals. The best protection against this both on smart phones and computers is to remove all personal details from your account and lock down your security settings. Worryingly, anyone can develop and retail an app, even criminals. Some users may ‘root’ or ‘jailbreak’ their smart phones. This is the ability to tamper with a phone’s operating system.

A recent study found that the industry most susceptible to cybercrime is the travel industry. This is largely down to a change in consumer behaviour, with more and more people booking their travel online. Social attitudes today mean that people are far more willing to input bank details online and do not recognise that their details are data easily accessible by criminals. There are simple ways in which consumers can protect themselves such as researching the holiday company to ensure it is reputable and pay for holidays using a credit card.

By Akash Valand

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Comics

At CloudTweaks, we're plugged into the cloud, the internet of things and all that the web has to offer. From wearable technology, to mobile computing, cloud computing and big data, CloudTweaks is your source for updates and news on the most innovative technology.

Popular

Top Viral Impact

Are Cloud Servers The Right Choice For Your Business?

Are Cloud Servers The Right Choice For Your Business?

Cloud servers offer power, flexibility, reliability, and client friendly hosting for small and medium businesses that have outgrown shared hosting. New business hosting clients are bombarded with an incredible diversity of different choices for their site’s hosting. It can be a challenge to negotiate the range of platforms and the marketing hype that many hosting…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts It’s no secret that Cloud Computing is more than just a buzz term as that ship has sailed off a long time ago. More and more companies are adopting the uses and benefits of cloud computing while aggressively factoring cloud services spending into their budget. Included is an excellent…

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats Each week on CloudTweaks we provide a few shoutouts to companies who provide engaging and interesting infographics that reflect our readers interests.  In this case, we have an excellent infographic provided by the team at arellia.com which takes a closer look at cyber-security and some of the biggest malware threats…

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014 The bring-your-own-device trend has been the subject of scrutiny ever since its initial formation. Given how quickly personal smartphones and tablets became a fixture in everyday life, it makes perfect sense that these mobile machines would slip into workplaces. While BYOD has caused headaches for many businesses,…

Featured Sponsors

The Internet of Everything Opens Up The World

The Internet of Everything Opens Up The World

Shaping The World With New Technologies As a connected collection of intelligent objects, the Internet of Everything promises to open up those areas of the world hardest hit by economic, political and agricultural blights. Relatively inexpensive devices, paired with revolutionary energy sources and unprecedented access to information offer great promise to farmers and workers in…

2015 Advertising Opportunities - Find Out More!

Cloud Logo Sponsors

hp Logo CityCloud-PoweredByOpenstack-Blue square_logo_100x100-01
cisco_logo_100x100 vmware citrix100

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter