clock graphic white
Mon - Fri: 9am - 5pm
Heading Recycle Bullet - Left

Types of Cyber Criminals who are coming for your Data

Heading Recycle Bullet - Right
Daliah Okoro
Daliah Okoro
October 5, 2015

With the number of business transactions that are now being done online, it is probably not news to hear about the importance of data security. However, it is also good to be aware of the different types of cybercriminals to be on guard for. One of the most common ways that hackers try to gain access to personal information is through phishers. Phishing is the attempt to acquire personal information such as passwords, usernames, and other identifying information by posing as a reputable source. Have you ever received an email claiming that your bank account is about to expire if you don’t immediately update your information? This is a form of phishing. Another everyday cybercriminal activity is a scammer. Your inbox has probably received an innumerable amount of scams over the years. Scams can occur through several different means from an offer to a timeshare to discount gadgets. You give them your credit card information, and you end up getting taken advantage of.

Next on the list of cybercriminals is the hacker. Hackers usually work anonymously and essentially create different tools and systems for the exclusive use of hacking into networks, databases, etc. More often than not, there is no rhyme or reason for the attack. Script kiddies are people who pretend to be a hacker but lack any serious skill or expertise. At the very least, script kitties are only able to hack into systems that are very weakly secured. Insiders are an extremely problematic group of cybercriminals. While they only make up about 20% of online threats, they created up to 80% of the damage. One of the biggest problems that they create is that they are often inside an organization and so have access to sensitive information. Hackers can also strip sensitive data from old computers that are thrown out or recycled incorrectly. To securely discard your old electronics, search for facilities that specialize in secure data destruction, like WC Recycler.

Finally, Advanced Persistent Threat Agents, or APT Agents, are the people who are responsible for extremely targeted attacks. They are incredibly organized and sometimes are even sponsored groups. Now that you know some of the more popular types of cybercrime, you will be prepared to protect your data.

Related Articles

OSHAS 18001:2007
ISO 14001:2004
Bonded and Insured