Background. Executive Summary
|
|
|
- Karen Casey
- 10 years ago
- Views:
Transcription
1 Background The Interdisciplinary Research Centre in Cyber Security at the University of Kent in Canterbury recently launched a second online survey 1 in order to get a better picture of the prevalence and impact of cybercrime victimisation, cyber security practices, and risks as seen by a sample of the UK population. Executive Summary The survey was composed of 8 questions that covered a wide range of cybercrime and cyber security related issues, and was carried out between the 22 nd and the 24 th of January, A total of 1,502 individuals from throughout the UK responded to the survey, of the 968 who indicated their gender, 407 were male and 561 were female. Ages were recorded in bands from 18 to 65+. Participants were asked about their experiences of cybercrime and cyber security practices over the last 12 months between January 2013 and January All eight questions were answered by each participant. 1. The majority of respondents felt at risk of being a victim of online crime over the last twelve months (67.7%), representing 926 individuals from the total sample (n=1,502). However, a significant proportion declared not feeling any risk at all (6.6%), just under 100 people, suggesting more work needs to be done in terms of campaigns for raising public awareness and education over the threat presented by online crime. 1 Through Google Consumer Surveys. More details of the service at
2 2. Over a quarter of respondents reported being a victim of a cyber-dependent crime over the last twelve months (26%), representing around 390 individuals, and a proportion of them experienced multiple incidents. These findings suggest a relatively high prevalence, despite the wide availability of security software and well-known best practices. 3. Eleven percent of respondents affirmed being a victim of a cyber-enabled crime over the last twelve months, representing 165 individuals from the total sample (n=1,502). Worryingly, of these, 102 individuals reported being a victim of either online harassment/bullying (n=43), stalking (n=34) or online sexual offenses (n=25). Despite the seemingly small numbers, these figures appear comparatively high in relation to traditional crime rates (CSEW, 2013) and indicate the necessity for further research in this area. 4. Whilst the vast majority of respondents did not report any significant impact as a result of being a victim of cybercrime, psychological and/or emotional consequences of victimisation were the most common response given, selected by 82 individuals from the total sample (n=1,502). Very little research has been dedicated to the impact of cybercrime in the United Kingdom, in particular beyond financial losses. These findings suggest there are other noticeable effects from online crime, which require further research in order to understand how best to address the needs of victims. 5. Of those respondents who reported a cybercrime, the majority did it to a financial institution (5%) or their Internet Service Provider (3.8%). The least common avenue for reporting a crime was through official channels, such as Action Fraud (2.7%), and law enforcement agencies (3.5%). These troubling findings indicate a low level of awareness on how and whom to report experiences of cybercrime to, highlighting the sore need for increased awareness among the general population covering the different options for properly reporting a cybercrime. 6. Just under 13% of those respondents who did not report being a victim of cybercrime, chose not to because they thought it was a waste of their time or they did not know where to report the crime. These results suggest a lack of awareness of available support from law enforcement agencies.
3 7. The prevalence of the Cryptolocker ransomware (3.4%) seems much higher than expected. The proportion of Cryptolocker victims that claim to have agreed to pay the ransom to recover their files (41%) seems to be much larger than expected (3% was conjectured by Symantec, 0.4% by Dell SecureWorks). Detailed Main Findings In the following sections, we outline the preliminary findings from the survey by discussing the results of each of the questions. The full findings will be written up for publication in a peer reviewed journal in the coming months. Q1. To what extent do you feel at risk from cybercrime? The majority of respondents identified feeling at risk of being a victim of an online crime (67.7%). Of these, 41.1% picked I feel at risk, I am careful when online, 20.9% picked I feel at risk, I m very vigilant online and 5.7% answered I feel the risk is unbearably high, as shown in Figure 1. Figure 1. Answers to Q1: To what extent do you feel at risk from cybercrime? Surprisingly, around 6.6% of the respondents surveyed do not feel at risk online and have the impression they will not ever become a cybercrime victim, suggesting there is a lack of public awareness around the threat presented by cybercrime. More cyber security education and awareness would do these users well, as they are in all likelihood the ones that will engage in
4 the more risky online practices and easy targets for cyber criminals. There are notably more men than women in this category: 10.6% vs. 4.4%. Q2. Over the last 12 months, have you been a victim of a successful? This question accepted multiple answers as outlined in Figure 2 and focused on cyberdependent crimes (e.g. hacking, viruses etc.). Over a quarter of respondents had been a victim of at least one of the listed cyber-dependent attacks over the last year (26%). Interestingly, a number of participants reported being victims of more than one cyber-attack. These findings suggest a relatively high prevalence of cyber-dependent crimes being committed, despite the wide availability of cyber security software and common industry practices. That offers a quite worrying perspective over the current threat that cyber-attacks represent for the average individual, especially serious and damaging ones like compromised accounts, which is often the gateway to all online accounts, and online banking. We found a relatively high number of people affected by an online bank attack (3.9%) which could be potentially very costly. This data is shown in greater detail in Figure 2. Figure 2. Answers to Q2: Over the last 12 months, have you been a victim of a successful?
5 Q3. Over the last 12 months, have you been a victim of? This question accepted multiple answers, as outlined in Figure 3 and focused on cyber-enabled crimes (e.g. fraud and theft, harassment/bullying, online stalking and online sexual offending). Just over four percent had recently been victims of online fraud or theft, very much in line with the 3.9% found in Q2 to have suffered an online banking attack. Harassment and bullying seem to be quite common also, with around 2.9% of the respondents claiming they have been victimised in the last 12 months. A similar percentage (2.3%) were victims of online stalking. Approximately 1.7% had recently been victims of some sort of online sexual offence. Worryingly a number of respondents had been victims of multiple cyberenabled offences over the last year. Despite the seemingly small numbers, these figures appear comparatively high compared to traditional crime rates (CSEW, 2013) and indicate the necessity for further research in this area. A diagram with the results can be seen in Figure 3. Figure 3. Answers to Q3: Over the last 12 months, have you been a victim of?
6 Q4. What were the impacts from the online crime(s) you experienced over the last 12 months? Also multiple answers were possible for this question, where we tried to investigate the various impacts felt by the victims of cybercrime. The 87.4% who have felt no impact at all from cybercrime is substantially higher than the 74% on Q2, so it includes a significant number of cybercrime victims suffering no significant impact. The most frequent type of impact is of psychological or emotional nature (5.5%), closely followed by a relatively mild financial impact of less than 1,000 (around 4.7%). Loss of reputation was next (2.4%), this may relate to the incidence of harassment/bullying (2.9%) in Q3 but also to social media account takeovers. Finally, 1% reported some sort of physical impact as a result of being a victim of cybercrime. Interestingly, around 1.9% of the respondents declared relatively heavy losses over 1,000 over the last 12 months. Dividing the financial loss in this way, instead of allowing for an open question was intentional, to avoid common biases expressed in recent publications 2. Although it is not possible to reliably extrapolate a global amount lost from the data, we can certainly conclude that having 1.9% of the respondents claiming to have lost more than 1,000 and 4.7% more than zero but less than 1,000 implies heavy losses for individuals across the country as a result of cybercrime. It is worth noting that 1.2% of the respondents ticked both of the financial possibilities (under 1,000 and over 1,000). Whether this was due to error, exaggeration, or in reference to multiple incidents within the same 12 month period, we don t know; in any case we believe it is a very small percentage that doesn t affect the overall results or conclusions. Whilst financial losses and loss of reputation are probably the most expected consequences of online crime, the survey suggests there are other important impacts on individuals (e.g. psychological, emotional and physical), which existing literature has paid little attention to so far and thus requires much closer attention in future research. 2 Sex, Lies and Cyber-Crime Surveys, by Dinei Florencio & Cormac Herley, in Bruce Schneier (ed.): Economics of Information Security and Privacy III, Springer
7 Figure 4. Answers to Q4: What were the impacts from the online crime(s) you experienced over the last 12 months? Q5. Who did you report the cybercrime to? Again, multiple answers were allowed to this question, as it is possible for a crime to be reported to multiple parties (e.g. bank and law enforcement). Most crimes were reported to the banks and other financial services (5%), which is hardly surprising as the large majority of them would likely involve illegally accessing the victim s bank accounts, transferring money, etc. and it seems natural to contact them first to try to stop these operations from being carried out. More surprising is that in second position came the victim s Internet Service Provider with 3.8%. One of the official avenues for reporting cybercrime, (e.g. Action Fraud) came last, with 2.7%, suggesting that awareness on how to properly report cybercrime is worryingly low. Other law enforcement was picked by 3.5%, and the victim s computer security provider (antivirus vendor, etc.) by 3.1%, as shown in Figure 5. We aim to take a closer look to how this relates to successful virus attacks (Q2) and antivirus usage (Q8), and how many of the respondents choosing None of the above did experience a cybercrime of some sort this
8 should be well over 10% already based on Q2 results. Figure 5. Answers to Q5: Who did you report the cybercrime to? Q6. If you did not report a cybercrime, what was your main reason? This question aimed to gain an understanding of why individuals may fail to report a cybercrime. Some of the recent press discussion on overall crime figures referred to the reporting rate of cybercrime. The most relevant finding (see Figure 6) probably was to find a relatively high percentage of people thinking that reporting was a waste of time (7.6% overall, but especially men at 9.6%) or not knowing who or how to report it (5.1%). These results suggest a lack of awareness of available support from law enforcement agencies regarding cybercrime and what they could do to get help. More information and investment in awareness campaigns could be a way to address this in the future.
9 Figure 6. Answers to Q6: If you did not report a cybercrime, what was your main reason? Q7. Have you ever been affected by CryptoLocker, or other similar malware or virus demanding a ransom? In this question, we tried to ascertain the prevalence of a recent and quite dangerous strand of malware called CryptoLocker 3, which encrypts data files in victim s systems, and asks for a ransom to recover them. General knowledge about the prevalence and success of this (and similar) ransomware is very limited, so a better understanding of how many people were infected and paid, and whether they were able to recover their files is interesting and quite a hot topic at the present time. The findings of this question are quite remarkable and defy previous estimations of prevalence and success by a large margin, sometimes tenfold. Of course we have to be cautious about the validity of the results shown here, for a number of reasons like the size and the bias of the sampled population and possibly others. Taking that (and its reflection in the relatively wide confidence intervals on some of these answers) into account, some figures are still remarkably high when compared with previous estimates. It is surprising that approx. 9.7% of the respondents claim to have been victims of some sort of ransomware. This figure is at least twice as high as the one we were expecting, judging from the scarce and quite speculative previous literature. Most of the ransomware victims seemed to have chosen not to pay the ransom, but a very high percentage of them indeed complied and sent the money to the cyber criminals. This percentage seems to be around 41% for 3 National Crime Agency (NCA) alert - Mass ransomware spamming event targeting UK computer users. 15 Nov
10 CryptoLocker and approx. 30% for other strands of ransomware (Icepol/Reveton, and many others). This is at least 10 times more than the last previous estimation by Symantec 4 of around a 3% of paying victims (a previous one by the Dell SecureWorks CTU research team 5 put this figure at 0.4%). If this were true and other researchers findings corroborate this figure in the future, it shows a lack of success of the multiple public calls discouraging victims to pay the ransom, and would explain the enormous success of this particular ransomware (from the criminals point of view, of course) and why copycats are rapidly emerging. Finally, both the prevalence of Cryptolocker (at around 3.4%) and that of other ransomware (6.4%) are much higher than expected. Figure 7a. Answers of No, never to Q7, sorted by sex A curious insight (shown in Figure 7a.) into this question is that it seems that women are less affected by this kind of malware, as they significantly picked the answer No, never more than men. This may or may not be a particularity of CryptoLocker and other ransomware. In fact, we have reasons to believe this would most likely happen with any other malware infection as women in general probably engage in less risky practices, and use security measures more frequently. Scotland seems to have been less affected by these ransomware strands than the UK average. For more on this, see Figure 7b and further discussion on the results of Q Ferguson, D. (2013, October 18) CryptoLocker Attacks That Hold Your Computer to Ransom. Retrieved Feb. 7, 2014, from
11 Figure 7b. Answers to Q7: Have you even been affected by CryptoLocker, or other similar malware or virus demanding a ransom? Q8. What measures have you taken to improve your online security over the last 12 months? In this question, we aimed at understanding better what security measures respondents had put in place to increase their security over the last year. Multiple answers were again allowed to this question, as multiple measures can be used simultaneously. Most used an up-to-date antivirus software (48.5%) or a firewall (36.2%) and a sizeable proportion used different passwords for different sites (33.8%) or changed them regularly (28.6%). It is particularly interesting that 8.3% decided to reduce their online banking and shopping activity in response to the threat of cybercrime. Worryingly enough, a 28.2% of the respondents did not engage in any of these security
12 practices. Again, perhaps a case for furthering wider education in the matter. The direct analysis of Q8 results by age, gender, and region led to a number of interesting insights. For example, it seems that the usage of antivirus steadily increases with age in the UK: This, on the other hand, is less clear over the use of a firewall (where 65+ seem less inclined to use it than people in the band) and this or a similar pattern is common to other security measures like changing passwords regularly. Additionally, and across almost all categories, it seems women take less risk and adopt better security practices than men. As an example, let s see what happens with regularly changing passwords: But this also happens in the usage of antivirus software, firewalls, password management, and even with reducing shopping and banking online.
13 It also looks like Scotland has the best security practices across all of the UK. This is clear in a number of cases, but let s focus on just two examples: The same holds for Scotland on the use of up to date virus protection, etc. Cautionary Note The relatively small size of this survey means that any extrapolation from these figures to total numbers of British citizens affected, total amounts of money lost, etc. are unlikely to represent the true national picture and should be approached extremely cautiously and conservatively. Authors Dr. Julio Hernandez-Castro and Dr. Eerke Boiten, of the School of Computing of the University of Kent, are the main authors of this survey and the accompanying documentation.
14 Magali Barnoux, of the Kent Faculty of Psychology, also contributed. The three are with the Interdisciplinary Research Center in Cyber Security. For more info and media inquiries please contact Katie Scoggins Press Officer, University of Kent
2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
Cyber crime: a review of the evidence. Samantha Dowling Cyber Crime Research Home Office Science Dec 2013
Cyber crime: a review of the evidence Samantha Dowling Cyber Crime Research Home Office Science Dec 2013 1 Purpose of the evidence review Set in context of the National Cyber Security Strategy (2011) and
Tackling Cyber Crime in the UK. Andy Archibald Deputy Director National Cyber Crime Unit
Tackling Cyber Crime in the UK Andy Archibald Deputy Director National Cyber Crime Unit Cybercrime Facts Cost of Cybercrime Reports of cyber crime to Action Fraud increase d by 30% 229 median number of
How To Prevent Cybercrime
2013 NORTON REPORT 2013 NORTON REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA,
National Cyber Crime Unit
National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme [email protected] Official Problem or opportunity Office for National Statistics In
Cyber crime: A review of the evidence Research Report 75. Chapter 4: Improving the cyber crime evidence base
Cyber crime: A review of the evidence Research Report 75 Chapter 4: Improving the cyber crime evidence base Dr. Mike McGuire (University of Surrey) and Samantha Dowling (Home Office Science) October 2013
2012 NCSA / McAfee Online Safety Survey
2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright
SMALL BUSINESS REPUTATION & THE CYBER RISK
SMALL BUSINESS REPUTATION & THE CYBER RISK Executive summary In the past few years there has been a rapid expansion in the development and adoption of new communications technologies which continue to
Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated
Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office
Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention
Global IT Security Risks
Global IT Security Risks June 17, 2011 Kaspersky Lab leverages the leading expertise in IT security risks, malware and vulnerabilities to protect its customers in the best possible way. To ensure the most
Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015
Cybersecurity: A Growing Concern for All Businesses RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 RLI Design Professionals is a Registered Provider with The American
The SMB Cyber Security Survival Guide
The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.
NetSafe/ AVG New Zealand Contents Page 1. Objectives and Methodology 3 2. Summary and Conclusions 6 3. Main Findings 8 Online security a serious issue 9 Concern about online challenges 11 Most important
Deception scams drive increase in financial fraud
ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL [email protected] Deception scams drive increase in financial fraud
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus
cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends
CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts
CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What
CYBER SECURITY STRATEGY AN OVERVIEW
CYBER SECURITY STRATEGY AN OVERVIEW Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without
Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
Special Eurobarometer 423 CYBER SECURITY SUMMARY
Special Eurobarometer 423 CYBER SECURITY SUMMARY Fieldwork: October 2014 Publication: February 2015 This survey has been requested by the European Commission, Directorate-General for Home Affairs and co-ordinated
Cyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions
SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.
Internet Security Priorities. Benenson Strategy Group and American Viewpoint December 20, 2013
Internet Security Priorities Prepared for: Presented by: Benenson Strategy Group and American Viewpoint December 20, 2013 Methodology The Benenson Strategy Group and American Viewpoint conducted 1,000
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
NORTON CYBERSECURITY INSIGHTS REPORT
NORTON CYBERSECURITY INSIGHTS REPORT Get informed about the truths of online crime and the personal impact it has on you Table of Contents > INTRODUCTION... 3 > WE KNOW THE RISK FOR ONLINE CRIME IS HIGH...
Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.
Defeating cybercriminals Protecting online banking clients in a rapidly evolving online environment The threat As the pace of technological change accelerates, so does the resourcefulness and ingenuity
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
DOMESTIC VIOLENCE AND THE WORKPLACE A TUC SURVEY REPORT
DOMESTIC VIOLENCE AND THE WORKPLACE A TUC SURVEY REPORT THE BACKGROUND TO THE SURVEY Domestic violence may happen behind closed doors but it has far reaching consequences and is known to have an impact
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one
Identity Fraud: What about the Victim?
Identity Fraud: What about the Victim? Research Findings Tim Pascoe Katy Owen Gemma Keats Martin Gill March 2006 Perpetuity Research & Consultancy International (PRCI) Ltd 148 Upper New Walk Leicester
CSM-ACE 2014 Cyber Threat Intelligence Driven Environments
CSM-ACE 2014 Cyber Threat Intelligence Driven Environments Presented by James Calder Client Services Manager, Singapore 1 CONTENTS Digital criminality Intelligence-led security Shylock case study Making
Issues in Information Systems Volume 15, Issue I, pp. 81-87, 2014
SECURITY REQUIREMENTS IN SOCIAL NETWORKS Mehdi Sagheb-Tehrani (PhD), Columbus State University, [email protected] Arbi Ghazarian (PhD), Arizona State University, [email protected] ABSTRACT
Making Sense of Cyber Insurance: A Guide for SMEs
Making Sense of Cyber Insurance: A Guide for SMEs abi.org.uk @BritishInsurers 2 abi.org.uk Contents Introduction 4 Six Key Areas to Look Out For in Cyber Insurance Policies 5 Potential Exclusions to Look
Global Corporate IT Security Risks: 2013
Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs
2011 NATIONAL SMALL BUSINESS STUDY
2011 NATIONAL SMALL BUSINESS STUDY The National Cyber Security Alliance has conducted a new study with Symantec to analyze cyber security practices, behaviors and perceptions of small businesses throughout
OCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET
WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON THE JUDICIARY HEARING ON PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN EXECUTIVE
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
Corporate Security in 2016.
Corporate Security in 2016. A QA Report Study Highlights According to ThreatMetrix, businesses in the UK are at greater risk of cybercrime than any other country in the world. In a recent survey carried
Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference
Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference Christopher T. Van Marter Senior Deputy Prosecuting Attorney Chief White Collar Crime Unit Department of the Prosecuting Attorney
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
CONSUMER SECURITY RISKS SURVEY 2014: MULTI-DEVICE THREATS IN A MULTI-DEVICE WORLD. July, 2014
CONSUMER SECURITY RISKS SURVEY 2014: MULTI-DEVICE THREATS IN A MULTI-DEVICE WORLD July, 2014 Contents Introduction... 2 Main findings... 3 Methodology... 4 Section 1. The use of different devices to access
Almost 400 million people 1 fall victim to cybercrime every year.
400,000000 Almost 400 million people 1 fall victim to cybercrime every year. A common way for criminals to attack people is via websites, unfortunately this includes legitimate sites that have been hacked
Cyber Crime ACC Crime
AGENDA ITEM 10 STRATEGIC POLICING AND CRIME BOARD 3 rd December 2013 Cyber Crime ACC Crime PURPOSE OF REPORT 1. The purpose of this report is to provide members of the Strategic Police and Crime Board
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
10 best practice suggestions for common smartphone threats
10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth
Special Eurobarometer 423 CYBER SECURITY REPORT
Special Eurobarometer 423 CYBER SECURITY REPORT Fieldwork: October 2014 Publication: February 2015 This survey has been requested by the European Commission, Directorate-General for Home Affairs and co-ordinated
Information Security Orientation. Joshua Spencer Chief Information Security Officer [email protected] Office: (214) 633-1233
Information Security Orientation Joshua Spencer Chief Information Security Officer [email protected] Office: (214) 633-1233 OF YOU WILL BE VICTIMS 46%this year to cyber-attacks such as
Fraud Advice for Businesses
Fraud Advice for Businesses What is Fraud? Fraud is a crime in which some kind of deception is used for personal gain. Fraud is sometimes also referred to by other names such as a scam or con. Businesses
Identity Theft Trends
PERSONAL PRIVACY Identity Theft Trends Privacy TouchPoint Services GIS CONTEMPORARY IDENTITY THEFT TRENDS Powered by Victims of Identity Theft, 2012 Erika Harrell, Ph.D. and Lynn Langton, Ph.D., BJS Statisticians
Identifying Cyber Risks and How they Impact Your Business
10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates
SANS Securing The Human
SANS Securing The Human Introduction Most organizations have invested in security technology to protect their information, putting in place solutions such as firewalls, encryption or IDS sensors. However,
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
Is your business secure in a hosted world?
Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer
Digital Consumer s Online Trends and Risks
Digital Consumer s Online Trends and Risks Modern consumers live a full-scale digital life. Their virtual assets like personal photos and videos, work documents, passwords to access social networking and
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
Quantitative research findings on RAPE in Kenya between Dec.30 th 2007 to June 30 th 2008. Estimated Statistics of Rape & pedophilia 40,500.
CRIME SCENE INVESTIGATION NAIROBI P. O. Box 12130-00400, Nairobi Tel: 254 20 240011 Fax: 254 20 343844 Quantitative research findings on RAPE in Kenya between Dec.30 th 2007 to June 30 th 2008. Estimated
CYBER CRIME & SECURITY SURVEY REPORT 2012_
CYBER CRIME & SECURITY SURVEY REPORT 2012_ Acknowledgements CERT Australia and the CIS would like to acknowledge the following contributors to the production of this report: CERT Australia s partner organisations
1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.
Agenda Item No. 5 COMMUNITY OUTCOMES MEETING SUBJECT: CYBER CRIME 4 August 2015 Report of the Chief Constable PURPOSE OF THE REPORT 1. This report outlines the Force s current position in relation to the
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
WHITE PAPER. Using DNS RPZ to Protect Against Web Threats SPON. Published June 2015 SPONSORED BY. An Osterman Research White Paper.
WHITE PAPER Using DNS RPZ to Protect An Osterman Research White Paper Published June 2015 SPONSORED BY SPON sponsored by sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
Cyber-Security Risk in the Global Organization:
Cyber-Security Risk in the Global Organization: Trends, Challenges and Strategies for Effective Management David Childers, CCEP, CIPP CEO, Compli Todd Carroll Assistant Special Agent in Charge, FBI Three
