Cyber Crime In Britain

There has been a significant growth in cyber criminality in the form of high-profile ransomware campaigns over the last year, according to the British National Crime Agency. 
 
Breaches leaked personal data on a massive scale leaving victims vulnerable to fraud, while lives were put at risk and services damaged by the WannaCry ransomware campaign that affected the NHS and many other organisations worldwide. 
 
Tactics are currently shifting as businesses are targeted over individuals and although phishing attacks on individuals are increasing, fewer are falling victim as people have become more alert. Because the distinction between nation states and criminal groups is increasingly blurred, cyber-crime attribution is sometimes difficult. 
 
Many Russian-speaking cyber groups are threatening UK interests, but home-grown cyber criminals are becoming more sophisticated and therefore a rising threat. 
 
Although young criminals are often driven by peer kudos rather than financial reward, organised UK cyber-crime groups are motivated by profit. Cyber criminals seek to exploit human or security vulnerabilities in order to steal passwords, data or money directly. 
 
The most common cyber threats include:  
 
• Hacking - including of social media and email passwords
• Phishing - bogus emails asking for security information and personal details
• Malicious software, including ransomware through which, criminals hijack files and hold them to ransom
• Distributed denial of service (DDOS) attacks against websites – often accompanied by extortion
 
The scale and complexity of cyber-attacks is wide ranging. 'Off the shelf' tools mean that less technically proficient criminals are now able to commit cyber-crime, and do so as awareness of the potential profits becomes more widespread. 
The evolving technical capabilities of malware means evolving harm as well as facilitating new crimes, such as the crypto-mining malware which attacks digital currencies like Bitcoin.  
 
Cyber-attacks are financially devastating and disrupting and upsetting to people and businesses. We know that there is significant under-reporting, although the new General Data Protection Regulation is likely to prompt a better picture of scale. 
Currently the level of sentencing at court is not commensurate with the seriousness of attacks, and this is an area which is ripe for consideration.
 
How you can Help
Most cyber-attacks could be prevented by taking these basic security steps: 
 
• Choose strong passwords and don’t reuse them for multiple logins
• Install security software such as anti-virus and two-factor authentication. This kind of software is often available for free.
• Keep all security software and operating systems updated (this can be set to update automatically)
 
For further advice on how to stay safe online please visit Cyber Aware, Get Safe Online or the National Cyber Security Centre .
 
National Crime Agency
 
You Might Also Read: 
 
Brexit Threatens Cybercrime Detection:
 
 
 
 
« Best UK Cyber Jobs Without A Degree
Securing Your Organisation’s Office 365 Environment »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Booz Allen Hamilton

Booz Allen Hamilton

Booz Allen Hamilton is a management & tech consulting firm. Technology services include cloud computing, cyber security, systems development and integration.

Talend

Talend

Talend is a leader in cloud and big data integration software. Applications include Risk and Compliance management.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

R3

R3

R3 is an enterprise blockchain software firm working with a broad ecosystem of more than 300 participants across multiple industries to develop blockchain applications.

Center for Infrastructure Assurance and Security (CIAS)

Center for Infrastructure Assurance and Security (CIAS)

CIAS is developing the world's foremost center for multidisciplinary education and development of operational capabilities in the areas of infrastructure assurance and security.

1898 & Co

1898 & Co

Keep your critical assets secure with a comprehensive portfolio of services from high-level assessments to fully managed security services designed for operational technology applications.

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) protects Singapore from external threats and safeguards its interests in areas related to terrorism, cyber security, other transnational threats, and geopolitics

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP provides solutions and services around Core Infrastructure, Cloud, Cyber Security, Enterprise Applications, Intelligent Automation and Data, Smart Buildings, and Managed Services.

Occentus Network

Occentus Network

Occentus Network is a telecommunications service provider specialized in High Availability Servers & managed Cloud services.

Forward Global

Forward Global

Forward Global designs and delivers services and technologies to manage digital, economic, and information risks.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.

Silobreaker

Silobreaker

Silobreaker is a SaaS platform that enables threat intelligence teams to produce high-quality and relevant intelligence at a faster pace.

Bestman Solutions

Bestman Solutions

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. Success depends on hiring the right people, and this is where we come in.

CyTwist

CyTwist

CyTwist is an early warning attack detection platform that complement your existing security suite and provides your security teams with unique detection capabilities of stealth targeted attacks.