British Police At War Against Cyber Crime

Cybercrime is an increasingly difficult issue for police forces in our current day and age as their IT resources are not as large as required, but about 53% of all crimes in the UK now have a cyber element. Where traditional forms of theft can be easy to prevent, criminals in Kent county of the UK, are now using the Internet to exploit people and steal their information digitally.

Often scammers will target vulnerable people and the elderly by claiming they are protecting them from the very people they are pretending not to be.

Earlier this year, a woman from Dartford in Kent received a phone call from a man claiming to be from Scotland Yard, who said her grandson had been arrested with cloned bank cards in his possession.  Luckily the woman did not pass on her details, but she got the impression someone would visit her house and ask to take her bank cards if she had.

Scams like this are getting more sophisticated, from phishing emails to ransomware directed at businesses. Criminals using cyber tactics to exploit people are the primary focus for Aimee Payne, Prevent and Protect officer for Kent Police. Ocfficer Payne specialises in cyber fraud prevention for the Kent Police said: "Somebody can attack your computer very, very easily nowadays. And it doesn't take somebody much to do that.

The best way of stopping cyber fraudsters in their tracks, she said, is to educate people on ways of keeping themselves safe from different types of digital crime.

The cyber expert said: "Around 53% of all current crime in Kent has some online element. Aside from personal cyber fraud, businesses are often found at risk of attacks from hackers who are testing their skills.

A common hacking tool is the DDoS (Distributed Denial of Service) which overloads websites with traffic and disrupts the services.

Aimee Payne works with children who have been found to be testing their hacking abilities and committing cyber offences.
She said: "At the moment, we're dealing with children around about 13 who have committed offences, and they're just trialling their skills out, seeing whether they can do it.

"One of the things that we do is educate around the law and give them a choice, whether they're going to go down the right path or the wrong path. Then we give them the resources to be able to utilise the skills in the right way."

Shujun Li, professor of cyber security at the University of Kent, said: "From phishing attacks to ransomware, cyberattacks are a real threat to organisations of all sizes including small and medium-sized businesses, large companies, the public sector and charities across the UK and the world. 

"They are also an increasing threat, with an estimated one third of UK SMEs becoming victims of an attack last year."

Kent Online:         Kent Community Podcast:

You Might Also Read:

Effective Cybersecurity Requires Both Cyber Training & Insurance Cover:

Country Eye App For The Rural Community:

 

 

« Killer Robots For Export
Cyber Skills Shortages Stands At Four Million »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Leonardo

Leonardo

Leonardo (formerly Finmeccanica) is a global high-tech company in Aerospace, Defence, Security & Information Systems including Cybersecurity & ICT solutions.

Berkman Klein Center for Internet & Society

Berkman Klein Center for Internet & Society

The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace.

Egress Software Technologies

Egress Software Technologies

Egress Software Technologies is a leading provider of data security services designed to protect shared information throughout its lifecycle.

IntelliGO Networks

IntelliGO Networks

IntelliGO Networks is a cybersecurity company focused on Managed Detection and Response (MDR).

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Jump Capital

Jump Capital

Jump provides series A and B capital to data-driven tech companies within the FinTech, IT & Data Infrastructure, B2B SaaS and Media sectors.

Privacera

Privacera

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

Imageware

Imageware

Imageware is a leader in biometric cybersecurity. Protect against costly, damaging ransomware hacks by employing biometric cybersecurity solutions.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

Distology

Distology

Distology are an award-winning cloud security distributor bringing a wealth of experience and strong relationships with a huge breadth of partners covering the UK, Ireland and Benelux.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.

Vernetzen

Vernetzen

Vernetzen is an industrial network and cybersecurity innovator focused on delivering practical solutions to connect and secure industry across the globe.

HYCU

HYCU

HYCU was born of the need to simplify data protection and provide equivalent levels of backup and recovery support across on premises, public cloud, and SaaS workloads.

Hunt & Hackett

Hunt & Hackett

Hunt & Hackett helps European companies prevent, detect and respond to today’s most advanced adversaries, safeguarding them against cyberthreats and espionage.