Education and normalisation is the key to tackling the cyber threat Part 2

26 Apr 2016

Education and normalisation is the key to tackling...

Cyber crimes are the most common of, but only one part of the spectrum of activity referred to as “Cyber Attacks”, but such incidents aren’t “attacks”. They are theft, vandalism, blackmail, or ransom or indeed any version of illegal activities that have affected society for thousands of years. 

Cyber Crime

The major differences between “cybercrime” and “conventional” crime is the scale of the effect that can be achieved.  Traditional theft is limited by how much swag the perpetrators can physically carry. Cyber crime is not. Traditional crime, unlike cybercrime, can often be investigated and solved within one national jurisdiction.  Cyber criminals can carry out crimes against their victims simultaneously, very cheaply and without necessarily leaving “home”. 

Does that sound scary? It doesn’t have to be. The police and other agencies are really good at thwarting conventional crime, they’ve had many years to develop new methods of crime fighting, from taking fingerprints to DNA profiling to other sophisticated techniques. The same principles apply to Cyber Terrorism, Cyber Warfare, and On-line Activism etc. – each sitting at different parts of the “Cyberattack” spectrum.  

Normalising the Hacker

The Portrayal of “hackers” in the media conjures up evil masterminds or sophisticated military units based in some secret bunker and surrounded by racks and racks of highly expensive and sophisticated equipment.  Of course, many do work for nation states, subversive or proscribed organisations or sophisticated international criminal gangs. Many hackers, however, are bored teenagers operating and experimenting out of their bedrooms or their parent’s basement or are regular self-taught criminals who find this type of crime somewhat less arduous than others.   Just like any opportunistic thief, these hackers would rather attempt to steal from an easy target and just like other types of criminal they rely on their victims’ naivety and carelessness.  When looking for a target, a hacker will typically choose something that will not require too much effort to attack.  

As with any regular criminal, if security is deemed too tight they will move on and seek out easier prey. If every person and organisation put effective, basic security into place the incidents we see on a regular basis will fall. By demystifying hackers and their mindset, they don’t seem as scary. 

For the latest PGI updates like our pages on LinkedIn – PGIPGI Cyber and Facebook – PGIPGI Cyber

By  Matthew Olney  – Communications and Content Executive at PGI (This article was first published in the New Statesman)

Read part one here and part three here 

Share this article


Your free global geopolitical
risk dashboard

PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.

The Risk Portal gives users up-to-date information and analysis on global affairs.

The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.

Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.

Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.

Visit the Risk Portal

Subscribe to our Cyber Bytes Newsletter

Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.

Get in touch today

For more information on how we can help you or your business, please contact us via:

Related News

CISMP, CISSP and CISM - what's in an acronym?

20 Mar 2017

There is a wide range of different security courses available, and a mind-boggling array of certific...

Read news article

International Womens Day - Pioneering Women in Tec...

08 Mar 2017

Pioneering Women in Technology – Katherine JohnsonThe Oscar season has been and gone. The...

Read news article

Law Firms and why they need cyber security

06 Mar 2017

Suffering a data breach can be devastating for any company but for law firms the impacts can be part...

Read news article
Back to the News Hub

Follow us

+44 (0)207 887 2699
©2017 PGI - Protection Group International Ltd. All rights reserved.
PGI - Protection Group International Ltd is registered in England & Wales, reg. no. 07967865
Registered address: Cascades 1, 1190 Park Avenue, Aztec W, Almondsbury, Bristol BS32 4FP