[rank_math_breadcrumb]

Growing threat of cybercrime?

  • Amsterdam, North Holland, Netherlands

Author:  Richard van Hooijdonk

Short Description

Growing threat of cybercrime? Not only to individuals but also to businesses of all shapes and sizes, across all sectors and industries. During the pandemic, incidents of cybercrime increased by an astounding 600 per cent. This makes cybercrime the fastest-growing crime in the world and companies and individuals are faced with more cyberattacks than ever […]

Growing threat of cybercrime? Not only to individuals but also to businesses of all shapes and sizes, across all sectors and industries. During the pandemic, incidents of cybercrime increased by an astounding 600 per cent. This makes cybercrime the fastest-growing crime in the world and companies and individuals are faced with more cyberattacks than ever before. Criminals are increasingly transitioning to the online space because that is where the money is.

And the reasons for the popularity of cybercrime are easy to understand. It is basically a low risk crime that can provide very high payoffs. Cybercriminals can make millions with almost no chance of getting caught. This is because they are becoming increasingly sophisticated, collaborating across global networks and cybercrime centres like Russia and North Korea. And as cybercriminals have access to secure and anonymised payment systems it’s virtually impossible to catch them in the act.

 

Our main challenges explained

 

As we are speeding towards a hyper-connected future, no global threat has grown as fast, or is as complex to understand, as cyberattacks. And unfortunately it isn’t a short-term challenge, either – it has become part and parcel of the new world we live in. There are many reasons why we are increasingly faced with cybercrime, some of which include inadequately protected IoT devices, ever larger volumes of data being generated, constantly changing security risks, a continuously expanding remote workforce, a global shortage of cybersecurity personnel, and so on.

IoT devices aren’t adequately protected

 

An important challenge that leads to an increase in cyberthreats is the fact that smart devices connected to the Internet of Things (IoT) are inadequately protected. This makes them very easy and increasingly popular targets. Devices like smart TVs, air quality monitors, smart speakers, routers, smart doorbells, and smoke detectors can be hacked and used to access home networks, spy on users, and obtain sensitive data like financial information, passwords, or even chat logs.

 

Many IoT devices are manufactured and sold with inadequately secure default settings, which often remain unchanged after people start using them in their homes. They have hardcoded or easily guessable passwords, and insufficiently secured network services, ecosystem interfaces, backend APIs, and cloud and mobile interfaces are another huge problem.

Then there’s the fact that off-brand IoT devices are often fitted with cheaper and insufficiently secured or outdated software components, bringing vulnerabilities right into people’s homes. Furthermore, when it comes to sensitive information – whether during data transfer or stored on the device itself – IoT devices often lack access control or encryption.

An increasingly remote workforce

 

Mainly as a result of the pandemic, many companies have decided to adopt hybrid work models or even transition to a fully remote workforce. But these distributed work environments pose various significant cybersecurity challenges.

 

While traditional offices generally have solid cybersecurity measures in place to protect company assets as well as employees, protecting remote workers is another thing altogether. Remote employees need to access cloud-based applications and sensitive data remotely, and there is generally insufficient software and hardware infrastructure in place to support safe communication and secure data transmission as well as monitor cyber threats.

 

Because of this, cyber attackers are increasingly targeting remote and hybrid employees. What’s more, hybrid workspaces often lack physical security as well, which makes them very challenging to monitor, putting organisations at increased risk.

 

Talent shortage in cybersecurity

 

Another important challenge is the fact that cybersecurity personnel are in very short supply, which impacts the way in which we can respond to and mitigate cyberthreats.

According to the Cybersecurity Workforce Study by the International Information System Security Certification Consortium (ISC)², the global cybersecurity talent shortage currently sits at more than 4 million people.

Furthermore, overworked cybersecurity personnel are struggling to keep up with their jobs’ challenges, while employers are struggling to prevent them from leaving. According to a global study of cybersecurity professionals by industry analyst firm Enterprise Strategy Group (ESG) and Information Systems Security Association (ISSA), in which more than 500 cybersecurity professionals were surveyed, almost 60 per cent say a shortage of cybersecurity skills has had a negative impact on the organisation they work for.

 

What are the most widely executed attacks?

 

The number, complexity, and variety of cyberattacks continuously increase, and according to the Cisco Annual Cybersecurity Report, the advent of network-based ransomware worms even enables attackers to launch attacks without any human intervention. And while cyberattacks are predominantly carried out for extortion and monetary gain, some more recent attacks seem to be aimed specifically at data destruction or political activism. Here’s an overview of the most common types of cyberattacks.

 

Malware

 

Malware is malicious software that is commonly spread by seemingly legitimate downloads or email attachments. Malware makes use of network vulnerabilities to infiltrate a system and can include computer viruses, worms, spyware, Trojan horses, and any other program or file that can harm a computer. Once inside the system, malware can retrieve data from your hard drive, deny access to critical network components, and even render an entire system unusable.

A virus can infect an application where it replicates and infects code in the computer system. Worms are programs that move and replicate across computers and networks and are used to overload email servers. Spyware is, as the name suggests, a type of spy program that gathers data about users, their systems and even their browsing habits. This information is used to download and install malicious programs or for blackmailing purposes. A Trojan is a malicious program that hides inside a legitimate program and is used to provide cybercriminals with access to computer systems.

 

Growing threat of cybercrime?

 

SQL injection

 

A Structured Query Language (SQL) injection enables an attacker to manipulate a database. An SQL injection can be used to access and retrieve information that was not intended to be displayed, such as private client details, user lists, or sensitive company data. During an SQL attack, malicious code is ‘injected’ using server query language – usually into a search or comment box on an unprotected website.

This enables hackers to send their own requests to a database and forces the server to release protected data. Now they can execute a range of nefarious activities, from manipulating the information in a database for their own ends to stealing sensitive data. According to Kaspersky Lab, because of the prevalence of websites and servers that use databases, SQL injection attacks are among the oldest and most widespread cyber assaults. Automated SQL injection programs that are freely available from open source developers enable cybercriminals to automatically perform attacks with just a few clicks and within only a few minutes.

 

Phishing

 

Phishing attacks involve sending mass amounts of fraudulent emails from seemingly legitimate sources to get sensitive information. The fraudulent emails contain links to a malicious script or file that enable cybercriminals access to your device. Once they have gained access, they can take over the control of your device, install malicious files or scripts or extract information such as login details, banking information, credit card numbers, and so on. Attacks can also be carried out via direct messaging or social networks where cybercriminals collect information about your interests, work, and activities. They use this information to convince the victim that they are someone the victim knows.

 

Ransomware

 

You can become a victim of ransomware attacks when malware enters your computer via a website that has been hacked (or a legitimate website with malicious ads), when you download infected files, when you install apps or programs from unknown sources, when you open a malicious attachment or link in an email, and various other ways. Ransomware locks you out of your computer and prevents access to your data until you pay a large payment in cryptocurrency.

It’s very difficult to defend your systems against this type of malware, whereas the code behind it is easy to get hold of via online criminal marketplaces. Ransomware often targets organisations with huge volumes of sensitive (consumer) data and cyber insurance policies, which makes them more likely to pay large sums of money, like medical institutions, government organisations, supermarket chains, media conglomerates, banks, universities, and so on.

 

Cyberattacks-as-a-Service

 

Cybercriminals are increasingly purchasing Attacks-as-a-Service tools, with criminal organisations even selling access to botnets or infected machines within organisations and businesses, significantly lowering the entry barrier for other hackers. Users don’t need to be skilled to use these services, empowering even the most inexperienced hackers to carry out highly sophisticated cyberattacks. Most of these services circulate in the underground economy and are based on either a convenient flat-rate or a subscription fee.

The tools are very user-friendly and customer-oriented, and even provide easy to use admin consoles and dashboards to monitor and manage profits ‘earned’. Criminal organisations sell or lease access to entire botnets and control infrastructures on cloud architectures that can be used to steal sensitive information or launch massive DDoS attacks against specific targets. Some subscription-based models – such as Ransomware-as-a-service – even enable affiliates to earn a percentage of each successful ransom payment.

 

In closing

 

It’s quite clear that vulnerabilities are not easy to fix and that the threat of cyberattacks will never be fully eliminated. That would require completely disconnecting our lives, which would not only be undesirable but virtually  impossible, as almost everything we do depends on connectivity. It enables us to search the internet, gives us access to top of the range medical treatment, allows us to communicate faster and more efficiently than ever before, and enables electricity, water, and food supplies.

 

In short – connectivity has become critical to each and every aspect of our lives. We will need to find ways to live with a certain amount of danger and take steps to prevent cybercriminals from exploiting our vulnerabilities. This is a serious challenge, however.

 

As technologies keep evolving into super-intelligent, almost self-sustainable systems, it will become increasingly difficult to predict where, when, and how cyberthreats will occur. Prevention, detection, and counteraction are still the best measures against cyberattacks, but we need to be very serious about this, as billions more hackable, unpatchable, and non-upgradable devices will be connected to the global digital grid in the next few years.

 

He has several Chip-implants, because he wants to physically experience the future.

 

Article written by: Richard van Hooijdonk who is a futurist, keynote speaker and trendwatcher, an authority on new technology.

Contact Us at WeSpeak Global and follow us on Twitter

Author Profile

The articles, video and images embedded on these pages are from various speakers and talent.

These remain the property of its owner and are not affiliated with or endorsed by WeSpeak Global.

Similar to Growing threat of cybercrime?

Sterling Hawkins

You can turn an unpredictable world into predictable results. It comes down to the practices we have in our businesses and with those around us. Even though we might not be able to predict the exact timing of a breakthrough, the practices create the conditions necessary to have a breakthrough, even making that breakthrough inevitable […]

  • Author: Sterling Hawkins
WS Logo 512

I mean, isn’t that the nature of goals to begin with? What’s missing between you and your goals might be walking the walk of your goals — not just talking the talk. Or rather, running the run of your goals. I’ll tell you what I mean. Goals are easy to think of but harder to achieve, aren’t […]

  • Author: Sterling Hawkins
WS Logo 512

You don’t just suddenly wake up one day, and digitally transform To Make AI Work. You don’t suddenly wake up with the know-how, where you solve your problems with artificial intelligence. It’s a journey that you have to progress through! Video Transcript Brett St Clair Welcome to teraflow.ai. And I’m really excited about the question, […]

  • Author: Brett st Clair
Ryan Estis

I first met Julie Faupel during a week-long personal growth retreat and learnt how to get Closer to Your Customer. The retreat required a total digital detox and abstinence of any conversation related to career, work or business. Julie and I became fast friends and for me personally, the retreat experience was transformational. Fortunately, the […]

  • Author: Ryan Estis
Douglas Vermeeren

Some business gurus are telling people that they need to develop YOUR HIGHEST VALUE SKILL or most valuable skills.That part is right! You need to focus on the skill that will give you the highest return on your efforts.   What they got wrong is that they are teaching that it is sales. Sales is […]

  • Author: Douglas Vermeeren
WS Logo 512

Do you remember what life was like right before you received the message of biggest trap in business that confirmed your appointment as executive? Or before you started your own business? Or before you took over the family business? Opportunities lay ahead like an orchard of fruit trees ripe for the picking and everything that […]

  • Author: Juanita Vorster
WS Logo 512

I have found that running gives me time to think, running give me time to introspect and running helps me heal so WHY ARE WE RUNNING?. I have embarked on all these journeys over the past 12 years for probably two main reasons. I suppose the first is the selfish side. It’s something I love […]

  • Author: David Grier

Let’s imagine for a moment that you are a gardener. Do any of the actions below seem like a good idea and Why Being Too Helpful Is A Bad Habit For Leaders?   Planting a seed and then digging it back up from time to time to check its progress Forcing open a flower bud […]

  • Author: Jones Loflin

Our Mission

We are your partner creating memorable and engaging experiences that go beyond the event itself.

© All rights reserved 2025. Created using VOXEL THEME