21st Century Cybercrime – The Evolution Of Protecting Your Data

“21st Century Cybercrime – The Evolution of Protecting Your Data”

cloud-security-infographic

The relentless development of technology has facilitated an increase in cybercrime, affecting individuals and businesses in different ways and to differing degrees. Since the advent of the internet the protection of data has been of paramount importance, however, the development of various technologies has made the protection of data more and more difficult to ensure. In the UK alone, cybercrime was found to cost organisations on average £2.1million per year with an average of 41 cyber-attacks per week.

Back when the internet age was still young, cybercrime was hacker led, largely committed by individuals hoping to prove the existence of glitches in operating system. An example of such was Moonlight Maze when hackers targeted military information held by the Pentagon. Proving the glitch was an end in itself.

As technology has advanced, however, cybercrime has become the domain of organised gangs seeking financial gain from their crimes. The cybercrime network is today a legitimate and sophisticated business with technical innovators at the top.

Information Theft

Information theft is increasingly common, with gangs infiltrating computer systems in order to extract the personal data of users. One headline grabbing infiltration occurred in 2011 when marketing giant Epsilon had their email lists hacked; those lists comprised customers of large firms such as Citibank and JP Morgan. The criminals used these email addresses for phishing.

The development of third party cloud storage technology has assisted cyber criminals as large batches of data are now so often stored within one cloud. It is essential that companies separate out their data across multiple storage options. Experts have indeed highlighted that cloud data is especially prone to crime due to a lack of security measures. For personal cloud storage it is essential to protect your data by using two-step verification if it is available.

Smart Phones

The continued technological advancement of smart phones also poses an opportunity for cyber criminals. Criminals employ those techniques used on PCs alongside new smart phone specific approaches. In particular, social networking apps which hold a wealth of personal information which are often exploited by cyber criminals. The best protection against this both on smart phones and computers is to remove all personal details from your account and lock down your security settings. Worryingly, anyone can develop and retail an app, even criminals. Some users may ‘root’ or ‘jailbreak’ their smart phones. This is the ability to tamper with a phone’s operating system.

A recent study found that the industry most susceptible to cybercrime is the travel industry. This is largely down to a change in consumer behaviour, with more and more people booking their travel online. Social attitudes today mean that people are far more willing to input bank details online and do not recognise that their details are data easily accessible by criminals. There are simple ways in which consumers can protect themselves such as researching the holiday company to ensure it is reputable and pay for holidays using a credit card.

By Akash Valand

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Latest posts by CloudTweaks (see all)

Sorry, comments are closed for this post.

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Interesting Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. So much, in fact, that you’re probably getting sick of hearing about it. Here are some interesting facts you might not know about big data via The Visual Capitalist: Big Data got its start in…

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues Nowadays, many companies are changing their overall information technology strategies to embrace cloud computing in order to open up business opportunities.  There are numerous definitions of cloud computing. Simply speaking, the term “cloud computing” comes from network diagrams in which cloud shapes are  used to describe certain types of networks. All…

Cloud Infographic – Cyber Security And The New Frontier

Cloud Infographic – Cyber Security And The New Frontier

Cyber Security: The New Frontier The security environment of the 21st century is constantly evolving, and it’s difficult to predict where the next threats and dangers will come from. But one thing is clear: the ever-expanding frontier of digital space will continue to present firms and governments with security challenges. From politically-motivated Denial-of-Service attacks to…

Cloud Infographic – The Power Of Cloud Disaster Recovery

Cloud Infographic – The Power Of Cloud Disaster Recovery

The Power Of Cloud Disaster Recovery Preventing a Cloud Disaster is one thing. Recovering from a disaster is a whole other area of concern. Today’s infographic provided by CloudVelox outlines some best practices and safeguards in order to help your business make more informed decisions. About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

CONNECT TO THE CLOUD

 

Cloud Logo Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Branded Content Programs

Advertising