What do you know about the murky depths of the cybercrime industry? Do you have a romanticized version of a lone hacker – brilliant and misunderstood – working with their bank of computers and fighting back against corporate injustice?
There are some hackers who do fit the “ideal” profile that we’ve been sold by Hollywood, but most are out for what they can get, plain and simple. And these hackers don’t really care who their next target is.
In fact, with the software and advances in tech available today, they probably don’t even know who their next target is. These programs are sent out online, via email, or planted on sites. Anyone who unwittingly installs this malware is a potential target.
And the damages wrought can be spectacular. Just check out the EveryCloud infographic below and you’ll see just how damaging cybercrime can be. You’ll learn about the greatest hacks in history, and who some of the most notorious hackers are.
Interestingly enough, the research undertaken by the team while compiling the IG found that 43% of cybercrimes were aimed at small businesses. So, forget that Hollywood image of the hacker railing against the system. These guys are nothing more than common criminals and, like all criminals, most prefer a softer target.
Sure, it could be very lucrative to hack a huge corporation, but it would also be a lot harder. Your standard malware is not likely to cut it. Some hackers will take on the challenge just to show how good they are, but most are trying to earn a dishonest pay cheque.
And, as we all know, time is money, so it’s time to brush up on your security awareness training. You can get a head start on this by reading through the IG below. You’ll find a lot of interesting statistics, and some great tips about securing your personal and business data against cybercrime.
Security awareness is about more than just simply choosing a strong password and getting the latest antivirus program. Those things do come into it, but truly defending yourself against an attack means that you’ll have to consider cybersecurity more holistically.
Who has access? How can you limit potential damage after a breach? What other things can you do to protect yourself? Find out now by reading through our cheat sheet below.