Archive for April, 2017

What is the nature of Cyber Crime?

The nature of cyber crime is so widespread that in some ways it is difficult to be really specific about it.

Any type of cybercrime will inevitably start with some type of data breach, which can either be digital or paper, and will most likely involve some type of theft of information from a business/organisation or individual.

The nature of cyber crime will to an extent depend upon both the individual committing the crime and the nature and type and scope of information that is stolen.

Often times simply the revealing of such information can have a devastating effect either on the individual or business, or in some cases political parties or the  reputations of a whole range of individuals or businesses.

In other cases cyber crime can quite literally be the  theft of money or various types of financial products.

This can be quite wide-ranging in terms of  credit card information, loan or mortgage applications, credit score reports or much more complex financial products used by banks and trading companies.


Cyber crime when committed against individuals through hacking a wireless network could invoice to be a breach of their privacy.

This is not to diminish the impact, but in the same way that if your house is burgled a big part of the damage is the sense of violation that an individual will feel aside from what is actually taken, a cybercrime where an individual has their privacy violated can equally be extremely upsetting.

Other examples of cybercrime can relate to a whole range of business or industrial activity.

The most obvious errors perhaps like to think that any business or company wants to keep  relatively private or secret, which could range from financial information, through to product design, through to bad news the company doesn’t want announced, through to theft of intellectual property etc

Cyber crime  can often also have a really ugly face when it is used to blackmail individuals or companies.

This is sometimes done through what is known as ransom ware  where information is stolen from a company, and a ransom demand in terms of money is issued for its return.

Sometimes the criminal  will essentially freeze the businesses entire IT systems and the mound a ransom for unfreezing them.


People often think of cyber threats as relating to government department or agency’s, or to political parties or to big corporations or businesses.

Whilst that in part is obviously true, the nature of cyber threats has grown hugely over the last few years, and most experts agree there will be a massive growth in the risk of cyber threats both to individuals and every type of business or organisation in the near future.

It is important to understand both the nature of cyber threats, and where they come from.

Whilst it is certainly true that the focus of my cyber threats relates to businesses and organisations, the growth of the Internet of things also means that in the next few years individuals own personal lives increasingly come under  threat of a cyber attack or a hack.

Focusing on cyber threats relating to a business organisation, the real risk for many people are a company’s information or knowledge database.

The information that any company or business has either about itself, its customers,  its supply chain, its competitors or its future plans can be of value to other people.


The nature of theft of information often doesn’t register with people because it doesn’t seem as horrific as say a violent crime that is physical in nature might do.

Cyber threats that relate to theft of any type of information from a company can often result in various types of cybercrime that can have devastating effects both on the business or organisation, and on any individual connected with it, either as an employee or a customer.

Information stolen from any company can be used either to defraud the company begin the process of perpetrating identity theft on individuals whose information has been stolen.

Depending upon the industry, financial information system can literally be a financial crime.

Other types of cyber threat often relate to some type of kidnapping and ransom demand.

This is where a cyber criminal essentially steals information from a  company and demands a ransom for its return,often known nowadays as some type of ransom ware.

The other type of cyber threat that is very real for a  lots of businesses is where someone manages to pack and individuals computer or the complete system and essentially freeze the entire network. They then demand a ransom payment to freeze the system and restore it back to some level of  normality or integrity

What is the Best Computer Security

cyber insurance    cyber insurance    cyber insurance    cyber insurance

When people talk about computer security nowadays, they are inevitably referring to cyber security or the real threats that relate to any type of computer wherever it is used.

Most people still think of computers as being essentially desktop computers, although that is and what has been something of a myth.

Today’s smart phones are very much powerful computers in their own right, although people still think of them as phones.

In a way a microwave is a computer, but people do not think of it as being particularly vulnerable to any type of cyber security.

What is important to realise perhaps is that the growth of the Internet of things is going to rapidly change everything that individuals and businesses have and do in their day-to-day work and personal lives.

This means that in fact, an individual’s microwave although refrigerator will become hackable as they will be wirelessly connected to the Internet, and thereby potentially open to some type of Data breach.

People may laugh at the idea of a refrigerator being hackable, as it doesn’t seem any particularly apparent risk involved therein.


What is really important that people realise that the nature of the Internet of things and of a smart home, along with smart phones, smart cars, online banking etc all adds up to a huge number of different layers of overlapping technologies that are all potentially at risk of some type of cyber attack.

It is key to understanding the risks involved, to understand that the term computer has changed and will change hugely over the next few years. Thinking of a baby monitor as a computer is perhaps a heart leap some people.

There have been recent reports of  baby monitors being hacked by individuals, who then talk through the baby monitors at the baby, which is overseeing a hugely distressing and concerning  environment both for the baby and for the family concerned.

Computer security is still very much about things like firewalls and security of systems, along with common sense precautions around opening email attachments, or downloading and installing dodgy software.

However, it has become much more than that, and the speed with which the Internet of things is set to overtake society in the next five years means that the nature of computer security will change drastically, and really needs a complete rethink in terms of individuals attitudes.


Having a cyber security framework is often referred to as some type of cyber governance, and in many ways its value lies in the fact that there is some type of framework at all.

It is rather like the old saying that it is better to have a plan than  no plan at all, although having a bad plan might counter that argument.

The value of a cyber security framework is having a structure that addresses the fundamental issues relating to cyber crime and cyber security, and the need some type of cyber insurance either self managed through an insurance company.

The value of a framework of any type is that it is essentially a structure, should have a number of components which mean that the structure itself addresses the problems in an institutional way rather than simply relying on luck or judgement, or more normally one or two employees who are really up to speed with what needs doing.


The chief component perhaps of a cyber security framework is to have it recognised as being at the core of any individual or businesses corporate framework.

This means that it should be instigated at the most senior level of board or management structures, and the cyber security framework should involve some level everyone at the most senior level.

This obviously depends upon the size and nature of the business or organisation.

What is also crucial is to have a lead member of the business, ideally at board level or equivalent, who has social stability for the cyber security framework, both in terms of making sure that such a framework exists, and implementing processes to make sure it is effective.

That simply is about accountability and designated responsibility, which in a way is very different to any other aspect of any business or organisation.

What is different perhaps is a many people don’t take sides security as seriously as  they should, and as such to allocate that level of possibility or accountability to it.

Having a lead individual who can oversee a cyber security framework gives them the duty to put a structure in place that can both identify the risks to the individual or organisation, and do whatever they can to minimise or suppress those risks.

Such a cyber security framework or structure essentially involves two main elements, those of systems and staff.

The nature of both will vary considerably depending upon the size and nature of the business or organisation involved, but what is important is the sentence for as at the top of the framework.

That individuals are given specific tasks or responsibilities specific to cyber security, and there’s a level of accountability does not punitive in relation to their roles.

Having a framework that is flexible in terms of accountability and responsibility is crucial so that it doesn’t become institutionalised in its own right.

At the same time the nature of site security means having to trust a significant number of individuals to do their job properly, and needs to be clear guidance and direction as to how that can be done.



Looking for a cyber security course tends to throw up to slight the extreme and different ends of the spectrum.

The majority of cyber security courses or offered as MA’s  or MSc’s and are by their very nature by the additional two or an extension of some type of message of science degree.

They tend to deal with very technical areas of cyber security, and obviously geared to a very specific type of analyst or individual seeking a career in cyber security.

The other type of cyber security course tends to be offered to people at school, or people apparently school to give them some type of basics about how the Internet and mobile networking effectively works, and what risks and challenges inherent within the system.

Both these areas of cyber security courses  have their place, but it does leave a huge gap between for anyone who is interested in what the real risks of cyber security are, and what an individual or business can do to protect themselves against such risks.


A lot of the challenge for anyone involved in the cyber security world is to make it really relevant to individuals and businesses of all sizes before it is too late and data breaches or identity theft become a more common part of everyday life.

The growth of the Internet of things is set to explode in the next few years, and risks in terms of wireless networking and the potential for being hacked will become a real part of every individual’s day-to-day life.

The other challenge concerning the cyber security world is to make people aware of the real risks involved, without making people think it is simply some part of an operation fear type of movement, either by government or interested companies, because the nature of cybercrime and cyber security is by it’s very nature fairly invisible.

Part of the way forward is undoubtedly to education, and to having various types of cyber security courses that are available in the workplace and online for individuals to have a look at. It is likely, that the majority of people will only take cyber security and the threat of cyber crime  more literally when the consequence of it have become more widespread, and more people have become affected.

Education can change that, and needs to be done quickly as the growth of the Internet and the scale of the cyber threats relate to it increases at speeds that people simply do not relate to on a day-to-day basis.


Information security is at the heart of cyber security and the risk of cyber crime, and the huge growth of information available online, both private and commercial, is set to intensify massively over the next  few years.

Some people will apply this to the term big data, and whilst big data is a huge issue in its own right because at the moment seem to be targeted to certain areas of industry and commerce, but the sense of how to protect and interpret the data poses huge challenges in its own right.

Not simply in terms of information security, but in terms of how the information can be kept safe in the context of interpreting it, and using various forms of artificial intelligence and a supply chain of subcontractors to do such interpretation.

Information security relates fundamentally to the various types of cybercrime  that are behind the majority of data breaches and attempts to infiltrate cyberspace and individuals  networks.

Sometimes this is a direct attempt to steal intellectual property from an individual or a business,  and such attempts if successful can have a devastating effect on that business or individual concerned.


Other times the theft or attempted theft of information relates to commercially sensitive data.

This can take hundreds of different forms, relating to and individuals or businesses plans for the future, can relate to key negotiating decisions regarding trade and commerce or working arrangements with other major firms or their own supply chain.

Information security can also relate to attempts to access government and defence related information.

This can sometimes be done by a hostile government, or agents of such a regime. Also these accounts can be done by criminals acting on behalf, although sometimes at an arms length, from various governments.

The other threat to government and industry of any type is simply to disrupt the effectiveness and day-to-day workings.

There is a serious risk to information security by targeting areas that are vulnerable in terms of people’s day-to-day reliance on them, and such weakening their systems and the sense of trust or integrity in their day-to-day working.

Information security also has a huge role in terms of businesses and organisation keeping customers information safe and secure.

This can relate to fundamental information on individual concerning the name, date of birth, place of birth etc.

This type of information is even more crucial because it cannot be changed, unlike a credit card, and one such information is taken can be used for identity theft purposes which can have a devastating effect on the individual concerned.


One of the problems for Internet security, is that too many people it means a combination of security measures taken by an IT team to make sure that hardware and software systems are up-to-date, and not clicking on any dodgy emails that you are not sure who they are from.

Whilst both of the above are true to an extent, the growth of the Internet and its reach into our lives has grown massively over the last few years, and is set to intensify levels that we cannot even imagine over the next five or 10 years.

What this means in terms of Internet security, both mobile and fixed, is that there has to be understanding of the real threats of cyber security, where the threats come from, what their purpose is, who is behind the threats and what can be done to minimise or eradicate them.

One of the other problems with Internet security is at people or sink that these things happen to other people, in this case these things meaning some type of data breach or computer system infection.


Getting people to be aware that these risks are real, and that they affect individuals in their own lives as well as every type of business and organisation is a massive task, and one that in many ways has to begin within a business or organisation itself.

The growth of the Internet of things is going to radically change how individuals and businesses live and to work with each other.

It will mean potentially that puts everything in every individual’s life, both personal and work will in some way be connected to the Internet, and as such vulnerable to some type of cyber attack.

The basics of Internet security or in some ways well-known, but also need to be continually repeated and updated in order to minimise the risk of any type of cyber attack data breach.

Simple things like changing passwords, and having effective passwords  that can’t be broken can make a massive difference, but are notoriously difficult to get people to take seriously.

It is a bit simpler stick to Senate education is the best course, but invariably it is.

A number of websites force people to change their passwords to specific standards, and irritating though it is, it will undoubtedly help.

Other areas such as fingerprint recognition and eye movement recognition also possible options for the future.

Public Liability Insurance and Cyber Security

Sometimes the very words Public liability Insurance make anyone involved in any business or organisation slightly nervous.

Many people think they don’t need any public liability insurance unless they are simply something like an events company, or where the nature of their business means they might potentially  have some contact with the public, and in certain cases need to have public liability insurance.

The issue of what type of business or company needs public liability insurance  will probably depend on who is paying for it, and whether or not they consider it a risk that they are willing to bear themselves, or whether they had been burned in the past and understand the need some type of insurance.

It is equally true that a number of  insurance companies and insurance brokers  will sell the need for public liability insurance when it is questionable whether it is really needed But all types of insurance that are not legally mandated will be taken out by individuals or businesses either because they have had a loss in the past, or they sufficiently open to recognise the need for it.

Where the issue of public liability insurance becomes much more relevant in some ways is the whole area of cyber security and cyber risk.

Any individual or business which holds information about themselves or any member of the public is potentially at risk of a data breach, which could result in some type of cybercrime involving the theft of information relative to a wide range of different individuals.


The nature of cybercrime and the need for some type of cyber liability insurance has mushroomed in the last few years, and is likely to grace the in the next few What is perhaps important to realise is that a significant number of insurance companies recognise the risk of cybercrime and the issue of cyber security generally, and specifically exclude it from different types of insurance policies.

These may well include public liability insurance policies, which an organisation or business may believe gives them the cover they need in the event of some type of data breach of cyber crime.

There is a need for businesses and organisations of all sizes to recognise the real risks and threats of cybercrime and cyber security, and to have specific clarification whether or not their existing public liability insurance policies, or domestic household policies, or any other type of commercial liability insurance by that includes or excludes cyber insurance risks.

If in any doubt, the individual or business should take out a specific cyber insurance policy, which may well become a much more normal feature of the insurance world in the next few years, as insurance companies move to limit their potential liability under existing types of commercial liability insurance policies. T

What is Cyber Liability Imsurance?

The need for some type of cyber liability insurance is recognised at a level by businesses and organisations, but has yet to become widespread in terms of an understanding of the real needs and risks of cyber security and cybercrime.

Many individuals and businesses who are at risk of some type of cyber crime either believe the risk is minimal, the real risk relates to other people or that they are already covered under some type of commercial liability insurance, or their own domestic household insurance.

The extent to which an individual or business is covered under their normal commercial or household insurance policy is highly debatable, and could be an area of real concern if any potential claim arises.

For people who don’t believe there is a real risk of cyber crime to them or their business, they could be right or they could simply be living in  some type of cuckoo land.

The need for some type of cyber liability insurance, is often referred to simply as cyber insurance will  obviously depend to an extent on the nature of the business or the individual concerned, but they should nevertheless be an understanding of what the real risks are, and whether they can be self managed or whether some type of cyber liability insurance is needed.

The nature of cybercrime and cyber security means that any individual or business with any type of network of computers or smart phones is potentially at risk.


A data breach can be either digital or paper, or a combination of both Such a data breach that she always includes theft of information which is then used in a number of ways to commit some type of crime fraud against the business or organisation, which can also involve either its  employees or its customers.

Such cyber crime or fraud can relate to financial information or products, or simply people’s money, but can also have a much more widespread and devastating effect in numerous ways depending upon the nature and scale of the business or organisation involved.

Cyber liability insurance can provide a wide range of different solutions, both financial and practical in the event of some type of cybercrime or data breach occurring. it is a good idea to research what type of site that liability insurance policies available, and keep a close eye on what insurance products become available in the future.

There is a growing sense that cyber liability insurance is in its infancy, and the need for it will grow massively over the next few years. T


An online social media post can lead to serious consequences. Now kids as young as seven years old are learning what they should and shouldn’t post online.

  • Garfield’s Cyber Safety Adventures
  • Teaches kids as young as 7 what they can post online

Rachel Pommer is in just the third grade, and she’s already come face to face with dangers online.

“You can talk on games I’ve played in the past, and I didn’t see very nice things, so I decided to tell my parents,” said Rachel Pommer, a third grader at St. Margaret Mary Catholic School.

Luckily Pommer recognized something was wrong.

She and other students at St. Margaret Mary Catholic School are learning how to keep themselves safe by learning what not to do online.

Full story. click here

Main site, click here


The division between Internet of Things developers and IT and cybersecurity experts is one of the core problems in securing IoT devices, according to government and industry experts.

“We tend to divide our world up into different categories: mobile, cloud, IoT, [operational technology], IT.

And, you know, I think that’s the basic problem,” said Ron Ross, fellow at the National Institute of Standards and Technology.

Regardless of how they are classified, “they’re all computers, firmware, and software,” he said.

Robert Bigman, president of  2BSecure and the former chief information security officer at the CIA, agreed that IT departments and IoT developers rarely talk to each other, making it harder for cyber personnel to secure the connected devices.

Full story, here

Main site, here