Professional Documents
Culture Documents
Introduction
Any type of criminal activity involving the use of a computer or other cyber device.
Types/ working
Healthcare (Insurtech)
Manufacturing
Government (RegTech)
Transportation
Types of Cybercrime
Examples of Cybercrime
solutions
Data
Global cost of cybercrime estimated in excess of $2 Trillion. 68% of breaches result in lost data
within first 24 hours.
Workings of Cybercrime
Foreign suppliers
Business Executive
Employee Email
Attorney
Data Theft
Ransomware
Ransomware is a type of malware from crypto virology that threatens to publish the victim's data or
perpetually block access to it unless a ransom is paid. For example you have to pay some amount or
provide your personal information before downloading any computer software or mobile app.
− School districts
− Hospitals
− Home users
Solutions
Customer is now transitioning to Microsoft Outlook – Being a more secure email provider
process of checking master supplier bank details has been implemented prior to paying any
invoices in order to mitigate this risk
The bank refunded the money, the account numbers were corrected and an IT review was
conducted to identify holes in the IT system
The emails contain formatting and grammatical errors not consistent with their usual style.
They make claims of a suspicious nature. A query of this email directed to either employee
of the group would likely have detected the fraudulent activity.
Bank responsible, confirmation from the bank.
Purchase cybercrime insurance;
Engage a Cyber Security Professional to review the security of your systems;
Educate staff on cybercrime and encourage them to remain vigilant in regard to the risks
around emails requesting payment or containing links;
Strict use of only official email addresses by all
Directors for conducting of entity related business.
BlockChain as a solution to Money laundering and Cybercrime
Block chain-powered payments are hyper-secure and private.
Details of transaction only available to participants of that transaction.
Changes in transaction only possible through consent of participants.
Eliminates the need for an intermediary to handle financial
services like money transfers.
Back up data
Consideration/ conclusion
• Contact authorities
• Employee counselling
• Termination of employment?
• Education