Stuhr in December 2019. These days, everything is digital . Be it banking for consumers, shopping on smartphones , or the storage of customer data in companies . Everyone willingly shares highly sensitive information in exchange for something. “Who isn’t on Facebook, Twitter, or Instagram, purchases from at least one online store , or uses personalized apps?” asks Haye Hösel, explaining: “Even those who only use their local phone provider or electricity supplier are in the digital world. Forgetfulness, simplification, and negligence in securing data make it very easy for cybercriminals to steal it.”
The certified data protection officer answers five important questions about data theft:
Is the danger really that great?
“Unfortunately, yes. The current BKA cybercrime report shows that the overall trend is increasing. For example, the number of malware variants overseas chinese database more than doubled between 2014 and 2017. Digital applications such as the Internet of Things (IoT), cloud computing, Industry 4.0, automotive IT (AIT), and e-commerce offer hackers ever more new attack surfaces, and the development of ever-new codes and programs is extremely rapid. According to the Police Crime Statistics (PKS), known damages from cybercrime totaled €61.4 million in 2018. The number of unreported incidents is even higher.”
What types of data theft are there?
“For example, there is formjacking. In this type of data theft, cybercriminals install malicious code on websites. Anyone who visits the website and, for example, provides personal data there, not only makes this information available to the website but also to the hacker. According to software developer Symantec, a member of the German Competence Centre against Cyber Crime e. V., this form of data theft was observed more frequently in November and December 2018 – times when enormous amounts of online shopping take place during Black Friday and the pre-Christmas shopping season.
Reading tip: One in three people fails in internet research
The provider recorded more than 3.7 million successfully blocked formjacking attempts in 2018 alone. Hackers are also increasingly targeting corporate cloud environments, gaining access to a large number of addresses, accounts, names, and information through a single targeted attack. These are then sold or used to create fake cloud accounts for new targeted attacks to send phishing messages.
These are emails with links or attachments that, when opened, install spyware, Trojans, or keyloggers (so-called malware), thus spying on data, damaging systems, or hacking login accounts. The problem with such so-called data breaches: The affected individuals usually only learn that their data has been stolen when it appears in a criminal offense or when their own person is publicly exposed. In this case, the behavior falls into the category of white-collar crime, intended to deliberately damage the image of companies, individuals, political parties, or similar organizations.
How do you notice a data theft?
“Anyone who suddenly receives a large number of suspicious spam emails should pay attention. This also applies to mail containing payment requests or late fees for transactions that were not completed, as well as suspicious activity on bank accounts. Personal data can also be used to create inflammatory posts and write messages . On social networks in the name of the affected individuals.
Anyone who is approached or contacted by caroline chen manager, business intelligence, application development, plant & specialized systems third parties about strange messages should definitely investigate. While the criminals in such cases are often not interested in . Personally harming the person concerned, they ‘simply’ want to use a different identity. However, if a complaint is filed, it will initially be directed at the innocent, and that is very annoying.”
Reading tip: Data protection experts are the exception in companies
What should you do if your data is stolen?
“In the event of a data breach, all passwords and email addresses should be changed immediately. Unfortunately, the problem is often that many belgium numbers people no longer know where their sensitive data is stored online. It’s easy to register with a particular e-shop because . A certain product is only sold there, without writing down the login details or even the portal. But what you forget over time remains in the online memory and provides cybercriminals with data.