logo
logo
Sign in

Is Monitoring the Dark Web the ideal Technique to Slow Down Cybercrime?

avatar
Thomas Shaw
Is Monitoring the Dark Web the ideal Technique to Slow Down Cybercrime?





Cybercrime starts and ends with stolen information.



In line with ITProPortal, the cybercrime economy may be larger than Apple, Google and Facebook combined. The sector has matured into an organized market place that may be likely more lucrative than the drug trade.



Criminals use revolutionary and state-of-the-art tools to steal info from huge and small organizations after which either use it themselves or, most typical, sell it to other criminals through the Dark Web. Get extra information and facts about www.onsist.com/threat-intelligence



Smaller and mid-sized businesses have turn into the target of cybercrime and information breaches for the reason that they do not possess the interest, time or money to setup defenses to protect against an attack. A lot of have thousands of accounts that hold Personal Identifying Information, PII, or intelligent property that might consist of patents, analysis and unpublished electronic assets. Other compact businesses work straight with bigger organizations and may serve as a portal of entry considerably just like the HVAC company was in the Target data breach.



Many of the brightest minds have created creative methods to avoid useful and private information from getting stolen. These facts security programs are, for essentially the most part, defensive in nature. They fundamentally put up a wall of protection to maintain malware out along with the information inside safe and safe.



Sophisticated hackers learn and use the organization's weakest links to set up an attack



Sadly, even the top defensive programs have holes in their protection. Here are the challenges every organization faces in accordance with a Verizon Information Breach Investigation Report in 2013:



76 % of network intrusions explore weak or stolen credentials

73 % of online banking customers reuse their passwords for non-financial websites

80 % of breaches that involved hackers used stolen credentials



Symantec in 2014 estimated that 45 percent of all attacks is detected by regular anti-virus meaning that 55 percent of attacks go undetected. The result is anti-virus software and defensive protection programs cannot maintain up. The bad guys could currently be inside the organization's walls.



Little and mid-sized businesses can suffer greatly from a data breach. Sixty % go out of business inside a year of a information breach in line with the National Cyber Security Alliance 2013.



What can an organization do to safeguard itself from a information breach?



For a lot of years I've advocated the implementation of "Best Practices" to safeguard personal identifying data inside the business. You'll find fundamental practices every single business should really implement to meet the requirements of federal, state and market guidelines and regulations. I am sad to say pretty handful of compact and mid-sized businesses meet these requirements.



The second step is something new that most businesses and their techs haven't heard of or implemented into their protection programs. It requires monitoring the Dark Web.



The Dark Web holds the secret to slowing down cybercrime



Cybercriminals openly trade stolen information on the Dark Web. It holds a wealth of details that could negatively effect a businesses' current and potential clientele. This is where criminals visit buy-sell-trade stolen information. It is uncomplicated for fraudsters to access stolen details they really need to infiltrate business and conduct nefarious affairs. A single information breach could place an organization out of business.



Thankfully, there are organizations that continually monitor the Dark Web for stolen information and facts 24-7, 365 days a year. Criminals openly share this information through chat rooms, blogs, websites, bulletin boards, Peer-to-Peer networks and other black market place sites. They identify data as it accesses criminal command-and-control servers from numerous geographies that national IP addresses cannot access. The quantity of compromised data gathered is extraordinary. As an example:



Millions of compromised credentials and BIN card numbers are harvested each month

Approximately one million compromised IP addresses are harvested every single day

This info can linger around the Dark Web for weeks, months or, often, years prior to it can be used. An organization that monitors for stolen info can see nearly instantly when their stolen data shows up. The following step should be to take proactive action to clean up the stolen information and facts and stop, what could grow to be, a data breach or business identity theft. The data, primarily, becomes useless for the cybercriminal.



What would take place to cybercrime when most smaller and mid-sized businesses take this Dark Web monitoring seriously?



The impact on the criminal side from the Dark Web could be crippling when the majority of businesses implement this program and benefit from the facts. The aim is usually to render stolen data useless as speedily as possible.



There won't be a great deal effect on cybercrime till the majority of compact and mid-sized businesses implement this sort of offensive action. Cybercriminals are counting on quite few businesses take proactive action, but if by some miracle businesses wake up and take action we could see a significant effect on cybercrime.



Cleaning up stolen credentials and IP addresses isn't complicated or challenging once you understand that the facts has been stolen. It is the businesses that do not know their facts has been compromised that can take the greatest hit.

collect
0
avatar
Thomas Shaw
guide
Zupyak is the world’s largest content marketing community, with over 400 000 members and 3 million articles. Explore and get your content discovered.
Read more