Cybercrime is a rapidly growing problem in our digital society. It includes all kinds of illegal activities using various attack techniques. Social engineering, the Internet, physical accesses and bank fraud are just a few examples. In this blog, we will discuss some examples of cybercrime, different types of cybercrime and how we can guard and protect against it.
In phishing, cybercriminals use fake emails or text messages to try to obtain, among other things, confidential identity information and the security codes for Internet banking, mobile banking and payment cards. In doing so, criminals try to appear reliable (for example, from a well-known organization, such as a bank). By obtaining the data, cybercriminals gain direct access to the victim's bank account.
For example, the cybercriminal can use a copy of the passport to take out loans, order subscriptions or even rent homes at the victim's expense. It also happens that a criminal keeps the data for a while, only to strike later unexpectedly.
With spear phishing, criminals go one step further. Here, criminals focus specifically on a person. To make the phishing appear as credible as possible, information about this person is gathered through social media, news articles or other websites that feature this person.
A phish message is then constructed with recognizable things collected about the victim (for example, that vacation in Ibiza, or that completed English study). With this data, the credibility of a phishing email is greatly increased, and the victim is more likely to fill out data or make payments.
CEO or CFO fraud involves someone else pretending to be the CEO or CFO in order to abuse their authority to force false payments or send sensitive information.
Employees are most likely to react when the authority of the CEO/CFO is abused. The more time and effort a criminal spends on CEO fraud, the more likely he is to succeed in receiving payments or information.
This is a type of malware that encrypts files on your computer and demands a ransom to release them again.
Malware is any software used to disrupt computer systems, collect sensitive information or gain access to private computer systems.
In this process, criminals use stolen personal information to impersonate someone else, such as to take out loans or make purchases.
Think: opening a bank account with your stolen passport. Or renting a car with your lost driver's license, only to never return that car.
Cybercriminals break into computer systems to steal sensitive information, take down websites or cause damage.
This includes threats, stalking and shame sexting through social media and other online platforms.
This game is designed for employees regardless of their level of experience with cybersecurity. It can be used during a kick-off cybersecurity awareness campaign, when onboarding new employees, to build support for the fight against cybercrime or as a group activity.
By learning through play, employees build the skills needed to strengthen the digital front line and protect the organization from the ever-changing threats of cybercrime.