Cyber Crime In Britain

There has been a significant growth in cyber criminality in the form of high-profile ransomware campaigns over the last year, according to the British National Crime Agency. 
 
Breaches leaked personal data on a massive scale leaving victims vulnerable to fraud, while lives were put at risk and services damaged by the WannaCry ransomware campaign that affected the NHS and many other organisations worldwide. 
 
Tactics are currently shifting as businesses are targeted over individuals and although phishing attacks on individuals are increasing, fewer are falling victim as people have become more alert. Because the distinction between nation states and criminal groups is increasingly blurred, cyber-crime attribution is sometimes difficult. 
 
Many Russian-speaking cyber groups are threatening UK interests, but home-grown cyber criminals are becoming more sophisticated and therefore a rising threat. 
 
Although young criminals are often driven by peer kudos rather than financial reward, organised UK cyber-crime groups are motivated by profit. Cyber criminals seek to exploit human or security vulnerabilities in order to steal passwords, data or money directly. 
 
The most common cyber threats include:  
 
• Hacking - including of social media and email passwords
• Phishing - bogus emails asking for security information and personal details
• Malicious software, including ransomware through which, criminals hijack files and hold them to ransom
• Distributed denial of service (DDOS) attacks against websites – often accompanied by extortion
 
The scale and complexity of cyber-attacks is wide ranging. 'Off the shelf' tools mean that less technically proficient criminals are now able to commit cyber-crime, and do so as awareness of the potential profits becomes more widespread. 
The evolving technical capabilities of malware means evolving harm as well as facilitating new crimes, such as the crypto-mining malware which attacks digital currencies like Bitcoin.  
 
Cyber-attacks are financially devastating and disrupting and upsetting to people and businesses. We know that there is significant under-reporting, although the new General Data Protection Regulation is likely to prompt a better picture of scale. 
Currently the level of sentencing at court is not commensurate with the seriousness of attacks, and this is an area which is ripe for consideration.
 
How you can Help
Most cyber-attacks could be prevented by taking these basic security steps: 
 
• Choose strong passwords and don’t reuse them for multiple logins
• Install security software such as anti-virus and two-factor authentication. This kind of software is often available for free.
• Keep all security software and operating systems updated (this can be set to update automatically)
 
For further advice on how to stay safe online please visit Cyber Aware, Get Safe Online or the National Cyber Security Centre .
 
National Crime Agency
 
You Might Also Read: 
 
Brexit Threatens Cybercrime Detection:
 
 
 
 
« Best UK Cyber Jobs Without A Degree
Securing Your Organisation’s Office 365 Environment »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Uniken

Uniken

Uniken REL-ID is a safe, simple, and scalable security platform that tightly integrates your identity, authentication, and channel security.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

Cyber Academy

Cyber Academy

Cyber Academy is one of the first institutions in the SE Europe region that provides a hands-on program in cyber security, blockchain and AI.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

CybeReady

CybeReady

CybeReady’s Autonomous Platform offers continuous adaptive training to all employees and guarantees significant reduction in organizational risk of phishing attacks.

Hazy

Hazy

Hazy specialises in financial services, helping some of the world’s top banks and insurance companies reduce compliance risk.

SecurityGate

SecurityGate

SecurityGate.io is the only Integrated Risk Management platform built for OT/ICS cybersecurity.

Templar Shield

Templar Shield

Templar Shield is a premier information security, risk and compliance technology professional services firm serving North America.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

Testhouse Ltd

Testhouse Ltd

Testhouse is a thought leader in the Quality Assurance, software testing and DevOps space. Founded in the year 2000 in London, UK, with a mission to contribute towards a world of high-quality software

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

SecureWeb3

SecureWeb3

SecureWeb3 helps businesses and brands to secure their Web3 presence by offering a full suite of security services including training, consultancy & brand protection solutions.

PingSafe

PingSafe

PingSafe is creating the next-generation cloud security platform powered by attackers' intelligence, providing coverage for vulnerabilities that traditional security solutions would otherwise overlook

AUCyber

AUCyber

AUCyber is a leading provider of managed cyber security solutions and consultancy services, specialising in supporting Australian organisations and Government agencies.