Cyber Crime What’s all the fuss about?

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Katrina Lopes. Every time you log onto a website, you leave a mark saying “I was here”
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Social impacts of the use of it By: Mohamed Abdalla.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Computer Security By Duncan Hall.
INTRODUCTION & QUESTIONS.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Computer Security Keeping you and your computer safe in the digital world.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Important Information Provided by Information Technology Center
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
An Introduction to Phishing and Viruses
Social Media Attacks.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Learn how to protect yourself against common attacks
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Information Security.
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
Cyber Security & IT: What’s Next?
Tackling Cyber threats together
Phishing is a form of social engineering that attempts to steal sensitive information.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Mary Kummer Jim McNall PRIMA Spring Training 2018
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
Keeping your data, money & reputation safe
Ransomware and Data breaches in public libraries
Tackling Cyber threats together
Cybercrime and Canadian Businesses
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Tackling Cyber threats together
Internet Safety – Social Media
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Internet Safety By: Ayana Shiggs.
Communicating in the IT Industry
Internet Safety By: Ayana Shiggs.
Cybersecurity Simplified: Ransomware
Thames Valley Chamber / Claire Logic
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Cyber Crime What’s all the fuss about? Introduce myself, Lead Cyber Crime Trainer for the past 2 years. Now in a new role for the Force, DMC, coordinating the activity for 30 DMI’s across the force. I’ve been asked to talk to you about ‘Cyber Crime’ which is such a massive topic area. Don’t worry I’m only going to talk for about 30 mins so will just briefly some of the areas that effect day to day policing . I’m going to start with a short video.

This demonstrates the vast quantity of data and traffic that the use of the internet allows. 700,000 people log on to Facebook 500,000+ photos shared via Snapchat 38,000 posts to Instagram

This just shows the scale of the online world and the access we have to it. Although the Internet of Things (IOT) allows us to have access to heating, lighting, etc etc via the touch of your smart phone it in turns brings with it risk and vulnerabilty.

3.9 Million cyber crimes reported in 12 months (2016) 28% of businesses reported attacks to Police Cost to UK economy... £49 Billion in 2014 Average breach costs £1.46M to £3.14M (large company) 500 Million new viruses in 2015 3000 DDoS attacks per day 500K phishing attempts per day (93% ransomware) 3.9 Million cyber crimes reported in 12 months (2016) this is up from 2.5M in 2015 28% of businesses reported attacks to Police Cost to UK economy.......£27 Billion in 2011 → £49 Billion in 2014 Average breach costs £1.46M to £3.14M (large company) 500 Million new viruses in 2015 3000 DDoS attacks per day 500K phishing attempts per day (93% ransomware) 80% of all security breaches could be avoided by better housekeeping!!!

So what are the risks?

PHISHING It’s estimated that 1, 580, 000 phishing emails are sent daily. Examples here are ones I’m sure all have seen or received. Phishing – Email sent for example from your bank ‘Dear valued customer just click this link to update you security settings’. The average Phisher may send 2,000,000 emails a day, 100,000 can reach a computer user, 5,000 respond to the email, 100 enter their personal details, £1200 from each person- there is a potential profit of £120,000 pounds IN ONE DAY. In 2013 an estimated £59 million worth of fraud was prevented through the arrest of 3 men traced to the UK who ran a sophisticated phishing scam. They had set up more than 2600 phishing pages that mimicked banking websites, used 70 million customer email addresses and gaining access to the banking details of over 30,000 customers.

MALWARE Malware – Malicious software, often poor housekeeping can lead to people clicking links, downloading software that the user won’t realise has compromised their computer Ransomware is something we are seeing a lot of. This is generally as a result of clicking on a link by an employee which triggers encryption of your whole network and the screen above then explains how you must pay a ‘ransom’ to obtain a key to be able to decrypt your systems.

INSIDER THREAT It is believed that people are responsible for 90 % of security incidents. Think of the contractors, cleaners and visitors to a business... Or perhaps an employee that is offered money for stealing data..... Or an ex employee that still has logins/passwords to computer systems......

The affect of Cyber Crime on your business #protectyourworld #protectyourworld is a link to Youtube Video of 3 case studies that we used as part of the campaign in Sept 2016, #protectyourworld

So what can you do?

Back up! Protect your systems so if you are a victim you can continue your business without any loss of data. Educate your staff! Educate staff to the risks, clicking on links, downloading from untrusted sources, or responding to urgent requests to change payment details. Check before doing anything!!! Protect your passwords! Consider who has access to passwords, privileged users and change when they leave the business. Report it!! Action Fraud; UK’s national fraud and internet crime reporting centre. Unless reported the true scale can’t be established.

Find out more www.cyberaware.gov.uk/cyberessentials “Government backed and industry supported scheme to guide businesses in protecting themselves against cyber threats” “Self assessment with responses independently reviewed by an external certifying body” “Self assessment, external vulnerability scan, internal vulnerability scan and on-site assessment” I would direct all businesses to this site. The Cyber Essentials scheme provides businesses small and large with clarity on good basic cyber security practice. By focusing on basic cyber hygiene, your company will be better protected from the most common cyber threats. Cyber Essentials is for all organisations, of all sizes, and in all sectors - we encourage all to adopt the requirements as appropriate to their business. This is not limited to companies in the private sector, but is also applicable to universities, charities, and public sector organisations. Find out more www.cyberaware.gov.uk/cyberessentials

WEDNESDAY 30TH NOVEMBER 2016 We are holding a Cyber Security Event for Businesses together with Get Safe Online. Contact April via aprilmccoig@thamesvalley.pnn.police.uk The details are being finalised but will be confirmed by the end of the week and then a press release will go out. The event is free to all. It will be held from 9am til 12pm and include a number of speakers regarding keeping your business safe. It will be held (tbc) at the Cornerstone Arts Centre in Didcot. Parking is available and is a short walk from the train station. Any queries please ask them to contact April McCoig via email.