Cybercrime: £130bn Stolen From Consumers In 2017

Hackers stole a total of £130bn from consumers in 2017, including £4.6bn from British Internet users, according to a new report from cybersecurity firm Norton.

More than 17 million Brits were hit by cybercrime in the past year, meaning the nation, which accounts for less than 1% of the global population, makes up almost 2% of the 978 million global victims of cybercrime and almost 4% of the global losses.

The losses were more than just financial. Each victim of cybercrime spent, on average, nearly two working days dealing with the aftermath of the attack.

The most common crimes were generally of a low-tech nature, such as attempts to trick individuals into revealing their personal information through bogus emails with generally low costs to victims.

Other forms of cybercrime were more expensive: the typical victim found that a technical support scam cost them £44, a ransomware attack £111, and a fraudulent purchase online costing as much as £166.

But Norton warns that cybercrime victims are not doing enough to protect themselves online. The report found that they are more than twice as likely as those who haven’t fallen prey to cybercrime to share passwords to online accounts with other people, and almost twice as likely to use the same password for all online accounts.

What’s more, a surprising number of cybercrime victims, more than a quarter, believe they are safe from future attacks.

“Consumers’ actions revealed a dangerous disconnect: despite a steady stream of cybercrime sprees reported by media, too many people appear to feel invincible and skip taking even basic precautions to protect themselves,” said Nick Shaw, Norton’s general manager for EMEA.

“This disconnect highlights the need for consumer digital safety and the urgency for consumers to get back to basics when it comes to doing their part to prevent cybercrime.”

The head of the UK’s National Cybersecurity Centre warned on Tuesday that it was a matter of “when, not if” Britain would be hit by a major cyber-attack, capable of disrupting critical infrastructure or the democratic process.

“Some attacks will get through. What you need to do [at that point] is cauterise the damage,” Ciaran Martin said.

Guardian:

You Might Also Read:

UK Cyber Chief: Company Directors Are Devolving Responsibility For Hacks:

Directors Who Conceal Cyber Attacks Could Face Prison:

« The World Needs More Computing Power
Leaving Hacks Behind - Cybersecurity Predictions for 2018 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Mobile Mentor

Mobile Mentor

Mobile Mentor is an independent provider of enterprise mobility solutions in New Zealand and Australia.

RiskSense

RiskSense

RiskSense empowers enterprises and governments to reveal cyber risk, quickly orchestrate remediation, and monitor the results.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

VietSunshine

VietSunshine

VietSunshine is a leading provider of network security infrastructure and solutions in Vietnam.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

Open Data Security (ODS)

Open Data Security (ODS)

Open Data Security is a market leader in the information security sector, offering services to companies, governments and individuals, helping them shield from hackers and cyber attacks.

11:11 Systems

11:11 Systems

11:11 Systems synchronizes every aspect of network services for your business. Build your network with the industry’s most trusted expert skills.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

Stronger International

Stronger International

Stronger International provides expert cyber services and training to organizations and individuals to enhance IT and security knowledge.

Softwerx

Softwerx

Softwerx is the UK’s leading Microsoft cloud security practice. We’ve been helping forward-thinking companies better secure their businesses for nearly twenty years.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

ImmuneBytes

ImmuneBytes

ImmuneBytes is a cutting-edge security startup that aims to provide a secure blockchain environment for a dependable and open Web3 ecosystem.

2021.AI

2021.AI

2021.AI serves the growing business need for full oversight and management of applied AI.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.