Skip to content
cybercrime
10 min read

What you need to know about cybercrime

In a world that is ever-more reliant on technology, the term cybercrime has been bandied around with increasing regularity. For those who are oblivious to this term, cybercrime is a type of criminal activity carried out by cybercriminals using an electronic device, network or computer through the internet.

Cybercriminals – often called hackers – take advantage of society’s reliance on using the internet to consume and access information and find devious opportunities to infiltrate their systems or devices to carry out their virtual attacks.

The driving force behind cybercrime is primarily money, as hackers look to infiltrate and damage or destroy devices, networks or computers for personal or political profit. Hackers don’t only target individuals but groups or organisations as well who use advanced techniques with amazing creativity to dupe unsuspecting victims.

Read on as we unpack some of the most common types of cyber crimes and what can be done to protect against these threats.

Types of cybercrime

Cybercrime typically falls under two categories:

  • Criminal activity that targets computers, devices and networks; and
  • Criminal activity that uses computers, devices and networks to commit other crimes.

Cybercrime that targets computers, devices and networks usually involves hackers that infiltrate and infect with viruses or malware (malicious software) in order to delete or steal information. In addition, they may sometimes use a Denial-of-Service (DoS) attack that stops a user from accessing a computer, device and/or network.

Cybercrime that uses computers, devices and networks to commit other crimes usually involves hackers that infiltrate with the intention of spreading malware or illegal information. Cybercriminals use both categories in tandem to inflict maximum damage, allowing them greater opportunities to profit from their methods.

Examples of cybercrime include:
  • Email and internet fraud.
  • Identity fraud – where personal information is stolen and used.
  • Theft of financial or credit card information.
  • Theft, sale or distribution of corporate information.
  • Malware attacks – where a computer, network or device is infected with a virus or other malicious software to inflict damage or destruction.
  • Cyber extortion – where hackers demand money to prevent an attack.
  • Ransomware attacks – a variation of cyber extortion where cyber criminals hold a victim's information until a ransom is paid.
  • Cryptojacking – where cyber criminals mine cryptocurrency using resources that don’t belong to them.
  • Cyber espionage – where cyber criminals access government or company information.
  • Phishing scams – where spam emails or other forms of communication are sent with the intention of tricking the recipient into doing something that weakens their security or the security of their organisation – such as logging into a platform using a link that sends the recipient to an authentic-looking website.
  • Distributed DoS attacks (DDoS) – a cybercrime used to crash a network or system by infiltrating and overwhelming the system with coordinated attacks.

It is evident that cybercriminals will try a wide range of deceitful techniques to gain access to your devices and networks – something you must take every precaution against. Read on as we discuss some powerful ways to protect yourself against cybercrime.

Protecting yourself from cybercrime

Now that we’ve covered the basics of cybercrime, it’s essential to understand how best to protect your computer and personal or business information from prying eyes.

Keep your software updated

By keeping your software and operating system updated at all times, you can ensure that you are protected with the latest security patches that repel the latest methods of cybercrime in circulation. In addition, using up-to-date anti-virus software will go a long way in protecting your networks and systems from cyber attacks, as it allows you to scan, detect and remove threats before they start with the damage.

Use strong passwords

Adopting the 'three random words' technique can help users to use suitably complex passphrases that they can actually remember. By using strong passwords hackers will find great difficulty in infiltrating your systems and networks. While it may be easier to create your own password, it may be better to use a reputable password manager that generates strong passwords randomly. Regular password changing harms rather than improves security. Many systems will force users to change their password at regular intervals, typically every 30, 60 or 90 days. This imposes burdens on the user and there are costs associated with recovering accounts. It is recommended that passwords to do not expire.

Be wary of spam emails

A common way for computers to get infected by malware attacks is through email attachments contained in spam emails (known as phishing). You should never open attachments from in emails where you do not know the source. 

Spam emails can also contain links or messages that encourage users to click on them. These should never be clicked on as they will direct users to authentic-looking platforms and trick users into parting with sensitive information.

Also, be observant of URLs that look unfamiliar – if your internet provider offers functionality to secure online transactions, ensure it is enabled before conducting any financial transactions online.

Final thoughts

With the number of cybercrimes around the globe at an all-time high, it is crucial to protect yourself and your business from becoming another cybercrime statistic. At tmc3, we understand that cyber security, data protection and compliance challenges are different for every organisation in every industry.

Our extensive expertise and suite of innovative products will ensure that your computers, networks and devices have the most stringent protection using cutting-edge technology and techniques. Make sure to contact us here and get the digital protection that you and your business deserve. Adopting the 'three random words' technique can help users to use suitably complex passphrases that they can actually remember.

avatar
I love to help organisations solve data protection challenges. To do this, I transform security and data privacy from being necessary overheads to becoming business enablers. I have enjoyed many leadership roles throughout my career in data privacy, information security, and risk management. I take pride in creating positive outcomes, with over 15 years' experience of exceeding expectations in high pressure environments, both domestically and internationally.

COMMENTS