British Police At War Against Cyber Crime

Cybercrime is an increasingly difficult issue for police forces in our current day and age as their IT resources are not as large as required, but about 53% of all crimes in the UK now have a cyber element. Where traditional forms of theft can be easy to prevent, criminals in Kent county of the UK, are now using the Internet to exploit people and steal their information digitally.

Often scammers will target vulnerable people and the elderly by claiming they are protecting them from the very people they are pretending not to be.

Earlier this year, a woman from Dartford in Kent received a phone call from a man claiming to be from Scotland Yard, who said her grandson had been arrested with cloned bank cards in his possession.  Luckily the woman did not pass on her details, but she got the impression someone would visit her house and ask to take her bank cards if she had.

Scams like this are getting more sophisticated, from phishing emails to ransomware directed at businesses. Criminals using cyber tactics to exploit people are the primary focus for Aimee Payne, Prevent and Protect officer for Kent Police. Ocfficer Payne specialises in cyber fraud prevention for the Kent Police said: "Somebody can attack your computer very, very easily nowadays. And it doesn't take somebody much to do that.

The best way of stopping cyber fraudsters in their tracks, she said, is to educate people on ways of keeping themselves safe from different types of digital crime.

The cyber expert said: "Around 53% of all current crime in Kent has some online element. Aside from personal cyber fraud, businesses are often found at risk of attacks from hackers who are testing their skills.

A common hacking tool is the DDoS (Distributed Denial of Service) which overloads websites with traffic and disrupts the services.

Aimee Payne works with children who have been found to be testing their hacking abilities and committing cyber offences.
She said: "At the moment, we're dealing with children around about 13 who have committed offences, and they're just trialling their skills out, seeing whether they can do it.

"One of the things that we do is educate around the law and give them a choice, whether they're going to go down the right path or the wrong path. Then we give them the resources to be able to utilise the skills in the right way."

Shujun Li, professor of cyber security at the University of Kent, said: "From phishing attacks to ransomware, cyberattacks are a real threat to organisations of all sizes including small and medium-sized businesses, large companies, the public sector and charities across the UK and the world. 

"They are also an increasing threat, with an estimated one third of UK SMEs becoming victims of an attack last year."

Kent Online:         Kent Community Podcast:

You Might Also Read:

Effective Cybersecurity Requires Both Cyber Training & Insurance Cover:

Country Eye App For The Rural Community:

 

 

« Killer Robots For Export
Cyber Skills Shortages Stands At Four Million »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Varonis

Varonis

Varonis provide a security software platform to let organizations track, visualize, analyze and protect their unstructured data.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

IS Decisions

IS Decisions

IS Decisions builds affordable and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS apps and data within.

Disklabs

Disklabs

Disklabs are industry leaders in data recovery, digital forensics and data erasure.

AnubisNetworks

AnubisNetworks

AnubisNetworks is one of Europe’s leading threat intelligence and email security suppliers.

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

The Center for Analysis & Investigation of Cyber-Attacks is one of the leading Kazakhstan organisations in the field of information and computer security.

Mitre ATT&CK

Mitre ATT&CK

MITRE ATT&CK™ is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

Ampliphae

Ampliphae

Ampliphae gives you an easy-to-deploy, sophisticated and affordable cloud-discovery, security and compliance platform.

NETRIO

NETRIO

If you are looking for a highly mature, exceptionally competent Managed Service Provider, NETRIO has solutions to keep your business running at warp speed with zero disruptions.

CyberUK

CyberUK

CYBERUK is the UK government’s flagship cyber security event and the authoritative event for the UK’s cyber security community.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Avalon Cyber

Avalon Cyber

Arm your organization in the fight against cyberattacks by partnering with the experts at Avalon Cyber.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.