Cybercrime In Britain Does Serious Harm

In very basic terms, cyber crime involves a computer, mobile or iPad. It is often hacking for money, or secret data about you or people and organisations you are connected to or it might be identity theft or child pornography and other reasons.  
 
 A British study into victims of computer crime carried out by Action Fraud has exposed the serious harm some victim’s experience, as well as barriers to reporting such offences.  Changes throughout the entire system are being recommended to better serve the needs of victims, and help protect others in the future. 
 
More than £190,000 a day is lost in the UK by victims of cyber-crime, police statistics show. The figures show 13,357 people in the UK reported cyber-crimes over a six-month period. More than 5,000 of those people were hacked via their social media and email accounts, costing victims £14.8m. 
 
More than a third of victims in that period fell prey to the hacking of social media and email accounts. Computer misuse involves hacking, denial of service attacks and ransomware. In the year ending 2018 it accounted for almost 10% of reported crime in the UK.
 
Researchers have found that there is poor research of computer misuse crime by UK authorities and now there are these 3 recommendations for reporting. 
 
1. The UK’s reporting systems have been a barrier to some reporting of crime, and recommends that this is up-graded. 
 
2. A review of information on all police force websites about computer misuse crime is also being advised, to ensure a consistency of reporting of such crimes across the country.  Researchers found that all police officers, staff and the public should be better trained in understanding what constitutes a Computer misuse and crime offence.
 
3. It is also recommended the National Cyber Security Centre works with key organisations who receive complaints from customers, including banks and social media providers, to encourage victims to report crime through common web links.
 
As the number of computer misuse crimes in 2018 was nearly a million yet less than 24k were actually recorded in the UK – as yet there are not any official statistics for 2019. The report recommends that victims should always report crime via their local police station.
 
Adults aged between 35 and 44 are slightly more likely to be victims of cybercrime (by around 7.4%). This is in comparison to 16 to 24-year-olds (4.9%), 65 to 74-year-olds (5.4%) and over 75 (2.8%). Households with incomes of more than £50,000 per year have a slightly higher risk than those below that threshold. This could be due to the fact that more affluent households tend to have more internet-connected devices.
 
Managers and professionals such as doctors and lawyers have a slightly higher chance of being victims of cyber-crimes.
Given that so few cybercrimes are actually prosecuted, protecting yourself from cyber-crime is key. 
 
Here are Six Key Cyber Security Points to follow:
 
  • Ensure that your devices are password protected with a strong password. The City of London Police, has warned people to keep separate passwords for online accounts.
  • Should any of your devices be stolen that you can quickly change account passwords. 
  • Be aware of your surroundings, make sure that no one is looking over your shoulder or watching as you type in passwords.
  • Do not click or anything or download anything unless you are 100% confident in the source.
  • Do not reply to emails asking for personal information or passwords. If an authority, perhaps your bank, asks for information over email, call your branch and ask for confirmation that they actually need this data.
  • Do not give out personal information, even something as simple as your address, unless you absolutely know that data is going somewhere trustworthy.
Remember,  cyber crime happens every day, and it happens to people just like you. No one is safe, though you can lessen your chances of being affected by following the advice given above.  Be alert, be vigilant, and be careful so that you don’t become a statistic!
 
BBC:       FSMatters:        Computer Weekly:    University of Portsmouth:     Tiger Mobiles
 
You Might Also Read:
 
Cyber Crime Cost UK Businesses £87billion:
 
« WEBINAR: How to achieve security visibility at scale in the AWS Cloud
Belarus Government Shut Off The Internet During Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

RiskLens

RiskLens

RiskLens is a software company that specializes in the quantification of cybersecurity risk.

Uniscon

Uniscon

Uniscon is a leading provider of cloud security solutions in Europe.

Redjack

Redjack

Redjack is a cutting-edge network analytics company focused on enterprise and ISP security and intelligence solutions.

FarrPoint

FarrPoint

FarrPoint is a specialist telecoms consultancy providing a range of services including cyber security assessments and technical assurance to safeguard your data.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

Next47

Next47

Next47 is a global venture firm, backed by Siemens, committed to turning today's impossible ideas into tomorrow's indispensable industries.

RIA in a Box

RIA in a Box

MyRIACompliance combines our team of RIA compliance experts with an online software platform to help investment advisers better manage regulatory compliance and cybersecurity responsibilities.

iSecurity Consulting

iSecurity Consulting

iSecurity delivers a complete lifecycle of digital protection services across the globe for public and private sector clients.

Nardello & Co

Nardello & Co

Nardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including Digital Investigations & Cybersecurity.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

DataSolutions

DataSolutions

DataSolutions is a leading value-added distributor of transformational IT solutions in the UK and Ireland.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.

Bastion Security Group

Bastion Security Group

Bastion Security combines the skills, expertise and leadership from Quantum Security, ZX Security, Helix Security and Cassini.