British Police At War Against Cyber Crime

Cybercrime is an increasingly difficult issue for police forces in our current day and age as their IT resources are not as large as required, but about 53% of all crimes in the UK now have a cyber element. Where traditional forms of theft can be easy to prevent, criminals in Kent county of the UK, are now using the Internet to exploit people and steal their information digitally.

Often scammers will target vulnerable people and the elderly by claiming they are protecting them from the very people they are pretending not to be.

Earlier this year, a woman from Dartford in Kent received a phone call from a man claiming to be from Scotland Yard, who said her grandson had been arrested with cloned bank cards in his possession.  Luckily the woman did not pass on her details, but she got the impression someone would visit her house and ask to take her bank cards if she had.

Scams like this are getting more sophisticated, from phishing emails to ransomware directed at businesses. Criminals using cyber tactics to exploit people are the primary focus for Aimee Payne, Prevent and Protect officer for Kent Police. Ocfficer Payne specialises in cyber fraud prevention for the Kent Police said: "Somebody can attack your computer very, very easily nowadays. And it doesn't take somebody much to do that.

The best way of stopping cyber fraudsters in their tracks, she said, is to educate people on ways of keeping themselves safe from different types of digital crime.

The cyber expert said: "Around 53% of all current crime in Kent has some online element. Aside from personal cyber fraud, businesses are often found at risk of attacks from hackers who are testing their skills.

A common hacking tool is the DDoS (Distributed Denial of Service) which overloads websites with traffic and disrupts the services.

Aimee Payne works with children who have been found to be testing their hacking abilities and committing cyber offences.
She said: "At the moment, we're dealing with children around about 13 who have committed offences, and they're just trialling their skills out, seeing whether they can do it.

"One of the things that we do is educate around the law and give them a choice, whether they're going to go down the right path or the wrong path. Then we give them the resources to be able to utilise the skills in the right way."

Shujun Li, professor of cyber security at the University of Kent, said: "From phishing attacks to ransomware, cyberattacks are a real threat to organisations of all sizes including small and medium-sized businesses, large companies, the public sector and charities across the UK and the world. 

"They are also an increasing threat, with an estimated one third of UK SMEs becoming victims of an attack last year."

Kent Online:         Kent Community Podcast:

You Might Also Read:

Effective Cybersecurity Requires Both Cyber Training & Insurance Cover:

Country Eye App For The Rural Community:

 

 

« Killer Robots For Export
Cyber Skills Shortages Stands At Four Million »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

ActiveCyber

ActiveCyber

ActiveCyber is a source for news, reviews, learning, and technological innovation in the active cyber defense industry.

Data Resolve Technologies

Data Resolve Technologies

Data Resolve offer a mechanism through which customers can detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

CryptoSec.info

CryptoSec.info

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers.

Elpha Secure

Elpha Secure

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Cyber Security Cooperative Research Centre (CSCRC)

Cyber Security Cooperative Research Centre (CSCRC)

The CSCRC provides frank and fearless research and in-depth analysis of cyber security systems, the cyber ecosystem and cyber threats.

Vaultinum

Vaultinum

Vaultinum are a trusted independent third party specialized in the protection and audit of digital assets.

Stack Identity

Stack Identity

Stack Identity protects access to cloud data by prioritizing identity and access vulnerabilities via a live data attack map.

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs are a group of IT security specialists, ethical hackers, and researchers driven to identify security flaws before cyber threat actors does.

Systems Engineering

Systems Engineering

Systems Engineering is a SOC 2, Type 2-certified IT strategy and managed technology services provider.

Secure Enterprise Engineering (SEE)

Secure Enterprise Engineering (SEE)

SEE provides disruptive cybersecurity system engineering, architecture, and operational capabilities to make our customer’s missions execute faster, smarter, and more securely.

tmc3

tmc3

tmc3 is an award-winning, people-centric consultancy that is transforming cyber security from an overhead into an organisational enabler.