What Cybercriminals Want: Company Data – by United Security Providers
CYBERCRIME IN BUSINESS
1. CYBERCRIME IN THE BUSINESS WORLD 1
Page 1 of 4
CYBERCRIME IN BUSINESS
D.C. Washington
DeVry University
BUSN-420: Professor Levin
2. CYBERCRIME IN THE BUSINESS WORLD 1
Page 2 of 4
It isimportantto knowthat Cybercrime isbigbusinessinAmericaandthroughoutthe world.Inasmuch
as a statistical breakdownshowsusthis,we can extrapolate thatthere willremainthatare enamoredof
it. If the “businessof Americaisbusiness”[asCalvinCoolidge sofamouslysaid],then,surelywe should
make it a part of ourbusinessregimentoguardagainstthisplaque thatsoeasilyaffectsourdailymeans
to do commerce usingsovital a tool as the internet. The sadstatisticsare palpable andthe Bureauof
Justice Statistics[BJS] give the following:
In 2005, among 7,818 businesses –
67% detected at least one cybercrime.
Nearly 60% detected one or more types of cyber attack.
11% detected cyber theft.
24% detected other computer security incidents.
Most businesses did not report cyber attacks to law enforcement authorities.
The majority of victimized businesses (86%) detected multiple incidents, with half of
these (43%) detecting 10 or more incidents during the year.
Approximately 68% of the victims of cyber theft sustained monetary loss of $10,000 or
more. By comparison, 34% of the businesses detecting cyber attacks and 31% of
businesses detecting other computer security incidents lost more than $10,000.
System downtime lasted between 1 and 24 hours for half of the businesses and more than
24 hours for a third of businesses detecting cyber attacks or other computer security
incidents.
Of course, these were from 8 years ago and gleaned using the NCSS [National Computer
Security Survey] documentation that pertains solely to the United States. As our firm does some
of its’ business abroad, take note that this is not an American phenomenon so much as it is the
result of a human condition. It is ubiquitous. To illustrate this, note the following:
and understand that our 23% of the pie comes from
our lack of preparedness in large measure. This Primer – it is hoped – will proactively deter this.
3. CYBERCRIME IN THE BUSINESS WORLD 1
Page 3 of 4
Furthermore, FBI statistics indicate that cyber crime statistics show that it is on the rise as can be
show here:
This would serve to illustrate that issues stemming from merchandising payments and outright
fraud involving File Scams are to be avoided [and, thus, deserve our focus]. It is critical that we
think outside of the box that most of us are in by reason of our not being criminal. Many of the
people who do this, do it for a living, are skilled programmers and/or practitioners skilled at
evading detection simply because of ineffective measures being taken to combat this ongoing
issue. The evidence is overwhelming that cyber crime merits our full attention. A December
[2014] survey by the Ponemon Institute [which informs concerning data security issues] showed
“that nearly half of IT security professionals & experts view cyberthieves as their biggest
concern…”
We can do no less. The survey found 92% of respondents suffering some type of cyberattack and
the FTC [Federal Trade Commission] reports that in 2007 there were some 221,226 internet-
related fraud complaints. Of course, we rely to some degree on our online payments so
organized cybercrime via the internet affects us as well.
4. CYBERCRIME IN THE BUSINESS WORLD 1
Page 4 of 4
Moreover, we should and must be adaptive as well as proactive as the dark hackers in cyberspace
surely are. As illustrated above, our major points of focus should be:
non-delivery of merchandise or non-payment for items sold
FBI-related scams [via emails, text-based phishing schemes etc.]
identity theft
computer-targeting
advance fee fraud
spam
auction fraud
credit card and overpayment fraud.
When, for instance, we routinely send out eBooks and emailings to select customers concerning
sales, markdowns and the like, we need to proactively envision the cyber-criminal salivating at
the opportunity that this routine measure could afford him. Phishing, mock advertisements,
duplicate emails filled with viruses and software Trojans could be there tools to pry into our
business clientele. To counter this, we need to implement the state-of-the-art software suite of
tools that are available to the business sector to provide tracking and combative measures to
detect and stop such efforts.
Referenda:
http://ieeexplore.ieee.org/
www.how2becomeanfbiagent.com
http://www.bjs.gov/index.cfm?ty=tp&tid=41
http://www.sciencedirect.com/science/article/pii/S096525900970057X
http://www.abajournal.com/magazine/article/feds_ready_to_tackle_cybercrime/