2. • The Cybercrime Prevention Act of 2012,
officially recorded as Republic Act No. 10175,
is a law in the Philippines approved on
September 12, 2012. It aims to address legal
issues concerning online interactions and the
Internet in the Philippines.
3. The Internet is an amazing tool for
communication, allowing users to connect
instantly over great distances. Unfortunately, the
reach and anonymity the network provides is also
a great tool for criminals, who have taken
advantage of the global network to ply their trade.
There are many different types of cyber crime, and
understanding the most common crimes and
frauds can help you avoid becoming a victim.
4. • To protect yourself from cybercrime, you
need to familiarize yourself with all the
different kinds. There’s just no going around
it. After all, you can’t defend yourself against
something you don’t know, right? Here are of
six major types of cybercrime that you should
know about.
5. 1. Hacking
By definition, hacking is the unauthorized
accessing of a single device (such as a laptop
or a smartphone) or a computer network, and
those who engage in the activity are called
hackers.
Keep in mind, though, that in the strictest
sense of the word, hacking is not illegal in and
of itself, and is therefore not a crime. It is simply
a skill, and it is what people can do with this
skill that may be illegal.
7. 2. Cyber stalking
Cyber stalking is the use of the internet
and various online platforms within as well
as other electronic devices to stalk, harass,
or blackmail any person or group. In some
cases, cyber stalking can escalate to
physical violence, rape, and even murder.
9. 3. Online identity theft
This is when a person is able to steal your
personal information (Social Security number, credit card
information, bank account numbers) through online
means. It can be achieved in a variety of ways such as
email phishing, malware injection, and brute force
hacking.
In terms of financial loss as well as the serious
hassle it causes, identity theft is one of the most
destructive forms of cybercrime. In one fell swoop, a
cybercriminal can take over your finances and take your
money.
11. 4. Online child abuse
This is, without a doubt, the most heinous
type of cybercrime. There are many activities
that constitute online child abuse including the
downloading, selling, and distribution of child
pornography through websites and forums and
the solicitation of children for sex via
chatrooms.
Along with cyberstalking, online child
abuse (and child abuse in general) is a federal
crime under the U.S. Code.
13. 5. Ransomware attack
A ransomware attack is when a cybercriminal
injects a specific kind of malware (called
ransomware) into your device. Ransomware gets its
name because it is designed to block access to your
data until a certain amount is paid, thereby holding it
for ransom. In most cases, ransoms are demanded
to be paid in bitcoins or other cryptocurrencies.
Ransomware attacks also cause significant
financial damage. In 2017, it was reported that the
global cost of ransomware exceeded $5 billion
dollars.
15. 6. Internet fraud (online scams)
The purpose of an online scam is for you the
victim, into willingly giving up money under false
pretenses. One typical scenario is called the “charity
fraud”. Here, a criminal appeals to your sense of
righteousness by posing as a representative of a
charitable organization dedicated to a meaningful
cause like cancer or AIDS research. After spinning
you around, the perpetrator will then ask for a hefty
donation, which can be a either a one-time payment
or a series of payments.
18. 1. Tighten your current security system. Your system and
all the software your organization uses offer guidelines
for maximizing security controls that you should follow.
Some are as simple as turning off unnecessary services or
using the lowest privileges settings.
2. Use patches. All it takes is a tiny hole in your system for
hackers to poke their way in. It’s critical to run regular
scans of your security system and all software to keep
them updated with patches.
3. Protect outbound data. Just as you protect your
system from incoming malware and bots with a firewall,
you need to make sure certain data never leaves your
system. It’s important to focus on egress filtering, to
prevent rogue employees or employees making honest
mistakes from releasing sensitive data or malicious
software from your network.
19. 4. Raise awareness. It’s important for everyone in
the organization to be savvy and alert about
security issues. This means watching for phishing
scams sent through email and messaging apps that
appear bonafide but are actually attempts to
retrieve credentials or sensitive data or release
malware into the system.
5. Be smart about passwords. Most organizations
have password policies that address reuse and
strength of user passwords. But one area that often
is overlooked is the local administrator’s PC
password is the same as the password used on
servers. It wouldn’t take a hacker long to infiltrate
the entire system and create internal and external
havoc with that information.
20. 6. Don’t ignore physical security. Just as you wouldn’t
leave your car keys in the ignition of your car for thieves,
you shouldn’t leave ID badges, credit cards, personnel
and financial files, and cell phones/tablets lying around.
Staff should be trained to keep these items on their
person or locked away when not in use.
7. Encrypt data. All PCs and personal information stored
in databases and on servers should be encrypted. This is
the best way to protect against hackers gaining access to
sensitive data.
8. Purchase a Cyber Insurance policy. If you do
experience a cyber breach, a solid Cyber insurance policy
will cover your losses and costs to repair the damage.
Notes de l'éditeur
The cost of cyber insurance depends upon several risk factors but for most small businesses annual premiums will range from $1,000 to $7,500.