Cyber Crime meaning computer-orientated crime is on the rise. Over the last six years there have been over 3 billion record breaches. Cyber Crimes can be described as actions committed against a group or an individual with criminal motive to intentionally damage the people involved. Regardless of whether you run a business or have a mobile phone, everyone is at risk of a cyber attack. Cyber Crimes that cross the borders of countries and threaten foreign organisations are sometimes referred to as Cyberwarfare.
Forms of Cyber Crimes
These Crimes can come in many different forms most common of which being, Phishing, File Hijacker, Screenshot manager, Hacking etc.
Therefore considering the rapid increase of Cyber Crime, it is essential that cyber security professionals keep updated with development and learning how to prevent and recover from attacks.
John Beattie, Principal Consultant at Sungard Availability Services, explores how organisations can evolve business continuity plans to adapt for the ‘new normal’ within the workplace.
Defence and Security Experts Nick Newman and Chris Cole of global innovation and transformation consultancy PA Consulting, discuss how online safety has taken a hit amidst the COVID-19 pandemic and how to work together to end the sexual exploitation of children online.
The Cyber Security Services Framework has been developed by NHS Shared Business Services to help protect the NHS and other public sector organisations to mitigate cyber threats.
In the second article of this two-part series, Sascha Giese, Head Geek at SolarWinds, shares the final 5 steps that public sector organisations should adopt in order to form a robust security strategy.
Nic Sarginson, Sr. Solutions Engineer for UKI and RSA at Yubico, discusses the cybersecurity issues facing healthcare organisations and how the threat dynamics are expected to change over the coming 24 months.
In the first article of a two-part series, Sascha Giese, Head Geek™, SolarWinds, shares 5 proactive security methods that public sector organisations should adopt in order to protect themselves against cybercriminals.
Laurent Colombant, Continuous Monitoring Solution Manager at SAS, explores the threat that procurement fraud presents to local government, and discusses the anomalies that AI and machine learning should be aware of.
Stephen Ufford, Chairman of the Board at Trulioo, discusses the dangers of anonymity within a digital democracy following an increase in voting-related cybercrime.
David Higgins, EMEA Technical Director at CyberArk, discusses how emerging IoT models and the expansion of 5G will open up a number of potential cybersecurity threats.
As cybersecurity experts begin to adapt to remote working, it is worth noting that there are strong parallels between a pandemic response and handling cybersecurity threats. Here, Raymond Pompon, Director of F5 Labs, explains why.
John Hackston, Head of Thought Leadership at The Myers-Briggs Company, offers a series of cyber tips and advice aimed at different personality types about their potential cyber security weaknesses.
Avishay Zawaoznik, Security Research Manager at Imperva, describes the types of spam campaigns designed to spread fake news and the dangers they pose on our understanding of coronavirus.