Skip to the main content.

1 min read

Who’s Winning In The Battle of Cyber Crime?

Cyber Security in AmericaAccording to The 12th Annual Survey of Cybercrime, 500 U.S. business executives, law enforcement experts, and government officials say that the cyber criminals are.

The Survey was co-sponsored by the U.S. Secret Service, the CERT Division of Carnegie Mellon University’s Software Engineering Institute, California-based consulting firm PwC, and CSO security news magazine.

Online attacks are increasing in number and in sophistication.  Hackers are breaking into computers, stealing information, and disrupting business operations, in greater numbers.  Plus they are using more advanced technologies that are difficult to detect.

According To The Survey:

  • 3/4s of those surveyed detected a data breach within the past year.
  • The average number of security intrusions was 135 per organization.
  • The top five cyber attacks are from malware, phishing, network interruption, spyware, and denial-of-service attacks.
  • Over 1/4th of the respondents said that attackers were insiders, such as contractors or current and former employees or service providers.
  • Respondents believe that cyber criminals are finding new ways to circumvent security technologies to obtain sensitive information that they can sell.

The Take-Away Messages From The Survey 

  • The U.S. government needs to take a radically different approach to cyber security.  This should include, but go beyond, antivirus software, training employees, working closely with contractors, and setting up tighter processes.
  • Businesses need to work closely with IT Security Professionals to ensure their confidential and private information is kept that way.

{company} can help.  We specialize in IT Security, and can help to prevent your business from cyber crime.  To learn more, contact us at: {phone} or {email}

What is ITAR Compliance and Who Needs to Get IT

What is ITAR Compliance and Who Needs to Get IT

ITAR is the control for the export and import of defense-related articles and services found on the United States Munitions List (USML). If your...

Read More
Information Systems Failure Will Cost Your Law Firm A Whopping $3000 Per Hour!

Information Systems Failure Will Cost Your Law Firm A Whopping $3000 Per Hour!

STOP THROWING AWAY YOUR HARD EARNED REVENUES BECAUSE YOUR COMPUTER NETWORK WAS SETUP BY SOMEONE THAT DIDN’T KNOW WHAT THEY WERE DOING! Simple enough!

Read More
Who Is Using YOUR Wireless Network?

Who Is Using YOUR Wireless Network?

Do you know how many users are tapped into your wireless network right now? How about when you’re not around?

Read More