{"id":179530,"date":"2019-02-18T09:09:00","date_gmt":"2019-02-18T14:09:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/a-look-at-the-2018-cybercrime-stats\/"},"modified":"2024-02-06T10:32:02","modified_gmt":"2024-02-06T10:32:02","slug":"a-look-at-the-2018-cybercrime-stats","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/a-look-at-the-2018-cybercrime-stats\/","title":{"rendered":"A Look At The 2018 Cybercrime Stats"},"content":{"rendered":"
The past few years have revealed trends that show us\u00a0cybercrime<\/span>\u00a0won\u2019t just go away. The following stats put the breadth of the threat into perspective:<\/p>\n With technology continuing to advance in favor of\u00a0cybercrime<\/span>, 2019 is likely to see its share of hacking headlines. The Cyber Security Breaches Survey revealed that\u00a043 percent of businesses<\/a>\u00a0experienced some kind of\u00a0cybersecurity<\/span>\u00a0breach in 2018. California alone lost\u00a0$214 million<\/a>\u00a0to\u00a0cybercriminals<\/span>.<\/p>\n VPNs<\/span>\u00a0are one way people try to protect their online privacy, but user behavior continues to counteract the best firewalls and security strategies. For example, despite knowing the risks of clicking an unknown link or email, many people do so anyway.<\/p>\n The\u00a0cybercrime<\/span>\u00a0economy mimics the global economy\u2019s shift towards a platform model. This mirrors the legitimate shift to social media, Amazon and Google. Platforms connect retailers and consumers and give people a place to interact in other ways. Unfortunately, this has given unscrupulous people an opportunity to get to know how these systems work and use that knowledge to commit\u00a0cybercrimes<\/span>.<\/p>\n Hackers love Microsoft Office file extensions. They know people trust them and are more likely to click on them. Emails are the most common way that\u00a0cybercriminals<\/span>\u00a0defraud their victims, and they do so by sending files with familiar extensions to mask malware and spyware. People use emails every day for all kinds of communications, including very sensitive information. Unfortunately, it\u2019s relatively easy for bad actors to send you an email that opens you up to viruses, identity theft and other risks.<\/p>\n Some hackers aren\u2019t interested in your personal information or causing havoc with your sensitive files. Believe it or not, some cyber criminals break into your computer to steal your computing power. They may use these unauthorized resources to mine\u00a0cryptocurrencies<\/span>, for example.<\/p>\n One of the latest threats involves the use of your computer or other devices for bitcoin mining. Symantec has reported an increase of\u00a08,500 percent\u00a0in the number of people caught coin-mining. This indicates that there are hackers dedicated to accessing and using a victim\u2019s computer resources in lieu of stealing personal data.<\/p>\n The short answer to this is that an individual with the right skills can earn far more via\u00a0cybercrime<\/span>\u00a0than most legitimate lines of work. Individuals can earn about half a million dollar a year by selling stolen data. There are several levels involved, however. Low-level hackers may be happy with petty crimes that put extra cash in their pocket. Highly specialized hackers can make millions working alone or as a team. Generally, though, hackers make about 15 percent more than those in traditional crime brackets. High earners bring home about$167,000 a month, mid-level earners rake in $75,000 a month and at the low end of the spectrum, petty\u00a0cybercriminals<\/span>\u00a0make $3,500 a month. For instance, someone managing multiple card data forums can bring in millions each month.<\/p>\n Just turn on the news any given night and you can find stories on data breaches, the bread and butter of cyber thieves. Personal data can be sold as is or used to created bank accounts and apply for credit cards, which are sold for small or large fortunes. Theft isn\u2019t the only crime possible. Major platforms are targeted for the myriad of data they collect. Even Facebook is not immune. It was in the news for a significant data leak in 2018.\u00a0Yahoo<\/span>\u00a0also had a major breach that compromised 3 billion user profiles.\u00a0Cybercriminals<\/span>\u00a0aren\u2019t shy about going after these giants, so it\u2019s up to you to increase your vigilance at home and at the office.<\/p>\n Smart home devices usually connect to your home network from an outside network. If your router is\u00a0adequated<\/span>\u00a0protected, you\u2019re opening the front door of your home for\u00a0cybercriminals<\/span>. With smart home devices becoming more common, savvy criminals are learning to take advantage of their vulnerabilities.<\/p>\n","protected":false},"excerpt":{"rendered":" What Is the Big Picture in Terms of\u00a0Cybercrime\u00a0in 2018? The past few years have revealed trends that show us\u00a0cybercrime\u00a0won\u2019t just go away. The following stats put the breadth of the threat into perspective: Cybercrime\u00a0was the\u00a02nd\u00a0largest crime in terms of the number of incidents reported. Cybercrime\u00a0accounts for more than half all criminal activity in the U.K.…<\/p>\n","protected":false},"author":5,"featured_media":159099,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-179530","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"\n\n
What Did\u00a0Cybercrime<\/span>\u00a0Cost in 2018?<\/h2>\n
What is a\u00a0Cybercrime<\/span>\u00a0Platform?<\/h2>\n
What Is the Most Common File Format Used By Cyber Criminals?<\/h2>\n
How Are Cyber Criminals Making Money Off Your Computing Power?<\/h2>\n
How Much Money Can a\u00a0Cybercriminals<\/span>\u00a0Make?<\/h2>\n
How Do Hackers Use Existing Platforms to Make Money?<\/h2>\n
Are<\/span>\u00a0Smart Homes Vulnerable to Cyber Attacks?<\/h2>\n