Facts About Cyber Crime
This article presents a number of facts about cybercrime, which is a real threat to many organisations.
Fact #1 About Cybercrime
Did you know that around 400.000 phishing sites are created daily?
Phishing is when malicious hackers try to get you or your employees to click on infected links. The infected links are often distributed in e-mails where the sender, at first glance, seems familiar.
Phishing can also happen directly via websites. Make sure it says ‘https’ and not just ‘http’ on the websites you and your employees visit.
Studies show that it in average takes 229 days before a safety breach is discovered. This means that the cybercriminals have a long time to install malware and ransomware. In our cyber awareness training we teach you and your employees what to do, if you experience someone suspicious.
When you and your employees are conscious about good cyber security, it is easier to react before it is too late.
Fact #2 About Cybercrime
Did you know that it cost a global shipping giant almost 2 billion Danish Kroner when they were hit by a cyberattack, that shut down large parts of their IT system, in June of 2017? Being hit by cyber attacks can be very costly due to lost earnings, the lack of access to important systems and the resources (both human and financial) used to solve the issue.
Fact #3 About Cybercrime
Did you know that social engineering is one of the most used methods in the attempt to get personal information about you and your employees?
In July 2022 the President of the European Central Bank, Christine Lagarde, was a victim of an attempt of social engineering. Cyber criminals tried to make her send an authentication code via a message app while claiming to be Angela Merkel.
Fact #5 About Cybercrime
Did you know that 20 % of Danish people use open wireless networks without a password or networks where the password is the same for everyone?
Additional fact: Did you know that according to Centre for Cyber Security the cyber criminals scan the very same type of open networks in attempts to gain access to personal information?
A more harmless example was when a journalist used the public wireless network in an airplane to send and read messages regarding upcoming articles. After the plane landed, another passenger thanked the journalist for the good reading, as he had gained access to his messages with a little technical ingenuity.