Cybercrime & ‘Cat&Mouse’ Technology Security


Cybercrime are offenses against individuals using computers/networks, with harmful intentions toward the victims reputation.

This can be directly or indirectly, either by “[…] distributing viruses,  denial-of-service attacks, illegally downloading files without authorisation, cyberstalking, fraud and identity theft, and stealing or publishing personal information such as individuals’ names and addresses.” (Kroenke, Bunker, & Wilson, 2014, p.394)

Common areas of crime are information theft to misappropriating funds, therefore an organisation can now act to avoid and protect against.

Cybercrime has only recently become a major risk for businesses as they rely more on technology and are using brand new low cost technology with limited testing, backups, and systems for protection.

“[…] information can be taken from organisations by being burned to DVDs, downloaded to USB drives, copied to MP3 players or stored on smartphones or tablet devices-it can be transferred by email, across the web and over wireless networks.” (Kroenke, Bunker, & Wilson, 2014, p.395)

It is not just protection from outside an organisation either, as it can stem from internally, such as from employee uncertainty with using new technology, employee relations issues, ect.

“The prevention and detection of cybercrime is the responsibility of the entire organisation, yet many organisations are not prepared to deal with it.” (Kroenke, Bunker, & Wilson, 2014, p.395)

There must be frequent reviews and capability, in order to both prevent and detect it and possible signs.

Other results from being subject to cybercrime for a firm can be public relations, as such a breech of private information could cause shareholders to lose confidence including brand/market confidence.

Steps to take if private information has been lost for a select group of individuals, include notifying them firsthand of their ‘compromised’ data, while protecting the business in covering themselves from ‘theft’ connotations.

Organisations can encourage commenting on ethical issues to educate their staff in reporting duties or how to avoid cybercrime in their role, specifically auditing.

While, implementing a formal security policy, on preventing inappropriate release of personal data.

You will have to deal with difficult or upset customers, law enforcement personnel, and management, in resolving any possible issues, therefore you should resolve their concerns/issues in a calm and understanding way.


“Computer criminals find a vulnerability to exploit and they exploit it.” (Kroenke, Bunker, & Wilson, 2014, p.395)

Its what they do, don’t take it personally as against your computer skills, as it can be a game of ‘cat and mouse’ for everyone.

However, it is good to educate yourself against methods of attacks, even when you are asked by them directly they could be disguised as a customer, making you unaware to possible threats for you to hand over payment details or products.

Having in place good computer security is a weight off your mind, if you prefer to outsource your information protection, and prefer not to get into any do-it-yourself complicated methods.

As businesses often can work out the customers (now hackers) location, email, name, and in some instances computer (contents, ip address) faster than anyone.

Such self-protection methods are using Linux as your operating system, for more on this see my article Linus Operating Systems Introduction.

The uses of Linux are endless with from the most specialised uses to the more basic.

Though, it is widely credited for its digital security and computer protection.

A specific example would be professional penetration testing and security auditing.

Security allows you to discover and see any vulnerabilities, whether causes by your actions online, or by external actors.

In order for you to thwart it and begin to create safeguards against future vulnerabilities.

Security on different devices also need to be improved, in order to continue to make it more difficult for the average hacker to find any vulnerability in the first place.

“[Such emerging bot] herders may be organised criminals, they may be terrorists, or they may be elements of governments inflicting a new type of cyber warfare on other nations.” (Kroenke, Bunker, & Wilson, 2014, p.395)

International communication is important and carriers important data, therefore you must be ready act to protect it, don’t overreact if it occurs, and take steps to make those around us aware of it also.

Reference List

Kroenke, D., Bunker, D., & Wilson, D. (2014). Experiencing MIS, (3rd ed.). Pearson.

Featured image supplied free from Pixabay.

Copyright © 2016 Zoë-Marie Beesley

Creative Commons License Licensed under a Creative Commons Attribution 4.0 International License.

Leave a Reply

%d bloggers like this: