Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementCybersecurity News

Tackling the cybercrime pandemic in 2021

By David Cripps
Cybercrime
September 21, 2021

Cybersecurity has been a priority for businesses for many years, however, even with investments in security processes and technology, cyberattacks are commonplace across all industries. Evaluating incidents over the years, cybercriminals have been keeping busy honing their craft, resulting in cybersecurity incidents increasing across the board. It is not only the rise in the number of incidents, but the perpetrators have also become more sophisticated, adapting swiftly and targeting victim companies more effectively.

Given the increase in attack sophistication over the years, it is imperative to establish new rules of the road for risk management and cyber fraud prevention. One needs to keep in mind that the ‘bad guys’ operate as a business. They are organized, tenacious and constantly augmenting their methods. Their objective is to make money whilst expending the least amount of effort in the shortest time.

Challenges in cybersecurity

There have been many challenges in people’s ambitions to achieving a more secure digital environment. Recently, the major challenge has been the global pandemic and the subsequent necessity to alter work and operational processes. The new vulnerabilities that emerged from shifting to a remote workforce have enabled hackers to exploit employees from home offices.

The COVID-19 pandemic has given cybercriminals a unique window of opportunity to play on human defenses. The US Federal Trade Commission received 1.4 million reports of identity theft last year, double the number from 2019. With remote workers less cautious, and as a result, more vulnerable outside of their organizations’ network perimeter, and the plethoric adoption of web- and cloud-based applications, cyberattacks have become more common and much more dangerous. Data leakage continues to be a significant blind spot for businesses and now we are stretching our perimeters by working remotely.

Not only this, but the cost of breaches has also consistently risen over the last few years. Considerable investments have been made to strengthen security postures. Despite all the efforts into protecting systems and data, cloud breaches are likely to increase in both velocity and scale. Google registered 2,145,013 phishing sites as of January 17, 2021. This is up from 1,690,000 on January 19, 2020 (up 27% over 12 months).

The state of cybersecurity readiness

While businesses know cybersecurity is a major concern, many of them are not prepared to tackle the increasingly sophisticated ploys of cybercriminals. Nearly 80% of senior IT and IT security leaders believe their organizations lack the necessary protection against cyberattacks, despite increased IT security investments made in 2020 to deal with distributed IT and work-from-home challenges.

It’s staggering, yet somehow not surprising that 20% of organizations worldwide have no plans when it comes to protecting themselves against cybercrime events.

These stats reveal that there are gaping holes and vulnerabilities in business networks for cybercriminals to extend their attack strategies.

Financial institutions must take a proactive approach

Financial services organizations and other businesses that are responsible for the security of customer financial data need to be agile and vigilant in their cybersecurity efforts. The high value of financial data, including Social Security numbers, banking details, and more, makes them a lucrative target.

It is interesting to note that financial firms are not breached as frequently as those in other industries such as healthcare. However, when they are breached, the incidents tend to be much greater and more detrimental than those experienced by other industries. For example, even though 7% of breaches in 2019 occurred at financial services companies, 62% of all records leaked in that same year were from financial organizations.

Managing risk and strengthening cyber fraud immunity

Businesses have made strides to address rifts in security processes, by integrating cybersecurity into business operations and IT infrastructure, however, there is still an enormous volume of work to be done. Bolstering security postures is a complicated and continual task.

An important step towards this complex undertaking is to study the latest stats. Cybersecurity statistics have an empirical value as they can point to gaps, growing threats, and alert to trends. The challenge, however, is to translate the data into practical and agile risk management strategies to be able to better protect ourselves. The alarming cybersecurity statistics for 2021 are a call to take the risk management mission more seriously.

Organizations need to prioritize investing in security solutions that help reduce the risks and plan and test an incident response plan to help ensure the business is resilient to high-risk attacks. A good practice is to engage security specialists to use the same techniques as the ‘bad guys’ to see if they can bypass the controls. Businesses need to ensure they have a trusted backup of their key systems and have tested and practiced recovery plan from if those systems were compromised.

Another important, but often overlooked way of safeguarding against cybersecurity assaults is through education and teaching employees to be better aware of safe computing practices. You should conduce “tabletop exercises” to test how your business would respond to a cyber-incident, not just how your IT department would respond. Also, ensure the staff knows how to identify and where to report a potential incident.

Thanks to the current macroeconomic factors, every business these days is a technology business due to the digital transformation. The world will store 200 zettabytes of data by 2025 on private and public IT infrastructures, cloud data centers, on personal computing devices, smartphones and on IoT (Internet-of-Things) devices. This is the reason cybercrime will cost the world $10.5 trillion annually by 2025. We must accept the reality that things will go wrong, but when they do, the impact can be minimized through education, rapid detection, response and recovery.

KEYWORDS: COVID-19 cyber fraud cyberattack cybercriminal phishing risk assessment

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

David cripps headshot

David is the Chief Information Security Officer (CISO) for Moneycorp and manages the overall responsibility for their information security program, ensuring that their information is appropriately protected, that they have suitable controls to identify, prevent, detect and respond to fraud or a cyber incident and that the personal data for which they are responsible is correctly managed.

Cripps has over 30 years of experience as a CISO, Director of Security and Data Protection officer, working at both strategic and operational levels to ensure that pragmatic solutions are implemented to provide an accepted level of risk to the business.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • LexisNexis info

    The state of fraud in the United States and Canada amid COVID-19 pandemic

    See More
  • SEC1220-Edu-Feat-slide1_900px

    Tackling complacency in the GSOC

    See More
  • Biometric authentication, fingerprint on phone

    Biometric authentication sees increase in adoption during the pandemic

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!