Infosec Cloud
Solutions. Services. Training.

The 'chat' from the cloud

Keep up-to-date with the latest trends, hints and tips on cloud-based security

How Cyber Criminals Operate

Date: May 8, 2017

Category: Blog

A new report from the National Cyber Security Centre (NCSC) outlines how cyber criminals are organised, their methods, and how their activities are monetised.

We’re all more aware of phishing emails and the risk of clicking on links and attachments that could potentially infect our personal devices, computers and company networks with malware. However, very few people are aware of the extent of the online criminal ecosystem that supports and enables these attacks, and the business model behind it.

This new report  – Cyber Crime: understanding the online business model – explains just that.

“Very few people are aware of the extent of the online criminal ecosystem that supports and enables cyber attacks, and the business model behind it.” 
Matt Carey, Head of London Operations Team NCSC

The report briefly outlines how cyber criminals are organised, their methods, and how their activities are monetised. It describes how Organised Criminal Groups (OCGs) share similar techniques and services, and communicate with each other over the ‘dark web’ where they can collaborate and advertise new services, tools and techniques.

To learn how to protect yourself, or if you’ve been a victim of cyber crime and want to report an incident, please refer to:

Cyber Aware: cyber security advice for individuals and small businesses, including software updates and information on creating effective passwords.
Cyber Essentials:industry-supported scheme to guide businesses in protecting themselves against cyber threats.

To help protect your organisation, implement:

Security Awareness Training & Testing: integrated online interactive cybersecurity training with ongoing random simulated phishing attacks.

 

 


Request a copy of the Report:

Full Name (required)

Business Email (required)

Company Name (required)

Enter these characters below: captcha

Comments are closed.

  • Employee GDPR Awareness Training

  •  Identity-as-a-Service (IDaaS) solution

  • Tokenless Strong Authentication (MFA)

  • Next Gen Endpoint Security

  • Enquiry LinkedIn Spiceworks