News

The hidden scale of cybercrime

Along with the development of technological innovation, cybercrime is growing, and companies are increasingly falling prey to it. According to the calculations of Chuck Robbins – CEO of Cisco, if you compare the amount of losses generated globally by online criminals with global economies, cybercriminals could successfully create the third largest economy in the world. It is estimated that in 2021, the cumulative losses resulting from criminal activity on the Internet amounted to approximately USD 6 trillion [1]. World Bank data presenting the world's largest economies currently rank the US (USD 20.9 trillion), China (USD 14.7 trillion) and Japan (USD 5 trillion) on the podium. A fictional cybercriminal country would push Japan to 4th place, while outclassing Poland, which would be ranked 22nd (0.6 trillion) in such a ranking.

The hidden scale of cybercrime

The statistics quoted are to a large extent estimates. It is impossible to calculate the exact values of the losses. This is due to the fact that, to a large extent, these are intangible losses and it is very difficult to convert them directly into money. Another major challenge to accurately calculating the impact of cyber attacks remains the widespread failure to report cybercrime violations by businesses. This is a phenomenon that both the services in the USA and Poland are struggling with. The number of court proceedings regarding cybercrimes is incomparably lower than the number of cybersecurity incidents reported by security organizations. Statistical sources [2] show that these two measures are separated by several orders of magnitude. In the USA, the requirement to report ICT security incidents has been known for a long time, and in Poland it is also not new. Operators of key services, companies and local governments are required to report such incidents to CERT Polska, operating in NASK. Unfortunately, quite often incidents are not reported at all or their scale is underestimated. Research conducted by Karpersky showed that a few years ago, 40% of companies around the world consciously concealed security incidents. The same report emphasizes that concealing a situation often leads to dramatic consequences, increasing the damage. Even one unreported event can result in huge data leakage or damage to the entire infrastructure of the organization. Statistics show that disregarding and deliberately concealing incidents has a significant impact on the security of corporate data. According to the previously mentioned report [3], 46% of companies confirmed that incidents resulting from inappropriate actions of employees resulted in data leakage or compromised their security. More than a quarter of companies (28%) have lost customer information classified as confidential or very sensitive as a result of these employee negligence. 25% of the companies on the list have lost financial information, including payment information. These types of leaks can carry immediate financial losses and have a long-term impact on a company's reputation. That is why it is so important to react quickly when a security incident occurs in the company. It is important to train employees so that they are able not only to see threats, but also to mitigate the risk with their behavior.

A separate problem related to the phenomenon of concealing cyber incidents and related losses is the fact that enterprises monitor incidents selectively. Companies, and especially large corporations, may be reluctant to report all incidents for fear of the potentially negative effects of disclosing this type of information. Admitting an incident could have an impact on the stock price, brand reputation or the imposition of financial penalties. Therefore, burglaries or leaks are not disclosed more than once, after the company has made an informed decision resulting from the analysis of the thresholds for the severity of the breach, as well as the legal and regulatory requirements.

In the aftermath of last year's Solarwinds [4] attack, the United States stepped up its efforts to foster a broader public-private partnership with a strong emphasis on developing legislation that paves the way for more common mandatory incident reporting requirements. The new regulations are also implemented by Poland on the basis of EU regulations such as NIS2 and DORA [5]. However, the regulations alone may not be enough to improve the statistics of cybercrime reports. Solving this problem requires companies to better train their employees, support and encourage internal reporting of incidents, and above all, sharing this information with authorities, organizations operating in the cybersecurity industry and the public. Disclosure of this type of information and implementation of mechanisms for their exchange will contribute to increasing the effectiveness of deterrence and defense against the growing problem of cybercrime.

Author:

Wiktor Sędkowski – graduated in Teleinformatics at the Wrocław University of Science and Technology, specialized in cybersecurity field. He is an expert on cyber threats. CISSP, OSCP and MCTS certificates holder. Worked as an engineer and solution architect for leading IT companies.

 

 

 

 

 

This article was written as part of the statutory activities of the Polish think tank Warsaw Institute. If you appreciate the content prepared by our partner, we appeal to you for financial support for this non-profit organisation.

More information:
www.warsawinstitute.org/support/

 

 

 

[1] https://www.varonis.com/blog/cybersecurity-statistics

[2] https://www.verizon.com/business/resources/reports/2020-data-breach-investigations-report.pdf

[3] https://plblog.kaspersky.com/the-human-factor-in-it-security/7079/

[4] https://www.cm-alliance.com/cybersecurity-blog/what-really-happened-in-the-solarwinds-cyber-attack

[5] https://cyberpolicy.nask.pl/wstepne-porozumienie-rady-i-parlamentu-europejskiego-na-temat-nis2/

author-avatar

Paulina Markowska

Uwielbia latać na paralotni, czuć wiatr we włosach i patrzeć na świat z dystansu. Fascynuje ją historia Wielkiej Brytanii sięgająca czasów Stonehenge i Ring of Brodgar. W każdej wolnej chwili eksploruje zakątki tego kraju, który nieustannie ją fascynuje. A fascynacją tą ‘zaraża’ też kolegów i koleżanki w redakcji:) Pochodzi z Wrocławia i często tam wraca, jednak prawdziwy dom znalazła na Wyspach i nie wyobraża sobie wyjazdu z tego kraju, dlatego szczególnie bliskie są jej historie imigrantów, Polaków, którzy także w tym kraju znaleźli swój azyl.

Read also

Gambling Advertising in Poland: What the Law SaysGambling Advertising in Poland: What the Law SaysTips for Safe Online Gambling in the UK in 2024Tips for Safe Online Gambling in the UK in 2024Hamas Attack on Israel: A Turning Point for U.S. Middle East PolicyHamas Attack on Israel: A Turning Point for U.S. Middle East PolicyGambling Industry in the UK: An Example for Poland to FollowGambling Industry in the UK: An Example for Poland to FollowU.S. Use G20 Summit in New Delhi to Strengthen Partnership with Emerging Markets Without ChinaU.S. Use G20 Summit in New Delhi to Strengthen Partnership with Emerging Markets Without ChinaEconomic cooperation between the US and Mexico – will Mexico replace China?Economic cooperation between the US and Mexico – will Mexico replace China?
Follow PolishExpress on Google News to receive news from UKFollow