February 29, 2016 By Douglas Bonderud 2 min read

Cybercrime is up. According to a PwC study, nearly one-third of global businesses have been victimized, while in the U.K., online crime has jumped 20 percent in the last two years and now accounts for 44 percent of the country’s economic crime over the past 24 months.

Despite the big bump for malicious actors, however, companies aren’t confident in their own security procedures or the ability of local police to handle this evolving attack vector. Is there a way to shore up InfoSec assurance even as cybercriminals diversify their efforts?

Fighting the Cybercrime Tide

According to Infosecurity Magazine, reporting on recent PwC survey data, the worst may be yet to come for U.K. businesses: 51 percent expect they’ll fall victim to a successful cyberattack in the next two years. What’s more, 30 percent still don’t have a cyber response plan despite the increasing severity of data breaches. John Tracey of PwC puts it simply: “The threat of cybercrime is now a board-level risk issue, but not enough U.K. companies treat it that way.”

While the tendency of InfoSec professionals and C-suite members is to look outward for incoming attacks, insider threats remain the biggest issue for companies. Although most are tied to ignorance or expedience rather than malice, the end result is the same. It’s no surprise, then, that many companies see the fight against cybercrime as a struggle against the tide, where even the best defense is only a temporary fix.

Double Disruption

Taking a page from recent Linedata results, Forbes tagged cybercrime as one of the largest disruptors to business over the next five years. While law enforcement agencies are making some progress as international collaboration becomes de rigueur, ComputerWeekly noted that most companies taking their problems to local police still experience the same response: Make a report, but don’t expect results.

Combating the threat of online crime requires a concurrent disruption to existing InfoSec procedures when it comes to detecting, monitoring and ultimately eliminating threats. First step? Design a cyber response plan — don’t be one of the 30 percent hoping they’ll somehow avoid the fallout.

Next, be prepared for a cultural shift. As cybercrime gains traction around the world, it’s not enough for companies to simply layer on security. Authentication, encryption and access monitoring must be built into every aspect of IT deployment, from front-line employees up to the C-suite.

With insider threats still the biggest security hole for even tech-savvy businesses, it’s not enough to spend on technology and shore up network defense. People must be an integral part of the process for companies to make the shift from crime spectators to active security players.

Cybercrime is up worldwide. The U.K. is taking the brunt and other companies can learn by example: It’s time for a new take on cybersecurity.

More from

The major hardware flaw in Apple M-series chips

3 min read - The “need for speed” is having a negative impact on many Mac users right now. The Apple M-series chips, which are designed to deliver more consistent and faster performance than the Intel processors used in the past, have a vulnerability that can expose cryptographic keys, leading an attacker to reveal encrypted data. This critical security flaw, known as GoFetch, exploits a vulnerability found in the M-chips data memory-dependent prefetcher (DMP). DMP’s benefits and vulnerabilities DMP predicts memory addresses that the…

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today