header-logo header-logo

Don’t become a hacker’s dream target!

10 October 2014 / E J Hilbert
Issue: 7625 / Categories: Features , Risk management , Profession , Data protection , Technology
printer mail-detail

Cyber-based crime has different motivators, different methodologies, and different targets, but most cyber criminals are financially motivated fraudsters who use the Internet to access data and facilitate their main objective: to make a profit.

As personal cyber security systems have become more robust and user-friendly, it has become harder for financially-motivated hackers (FMHs) to collect the data they need. Targeting only one individual at a time, breaking through each unique security system, and then committing a fraud on that one target with no guarantee of success is not a good return on investment or time.

Therefore, FMHs like volumes of data from which they can attempt mass fraud schemes, tweaking each attempt to ensure the highest level of success. As well as holding large volumes of data, the ideal target will usually have three main attributes:

  • Limited cyber security systems in place
  • Full access to the system or network on which they are based
  • IT support staff who are just that, “support” rather than security focused.

Professional

If you are not a subscriber, subscribe now to read this content
If you are already a subscriber sign in
...or Register for two weeks' free access to subscriber content

MOVERS & SHAKERS

NLJ Career Profile: Kadie Bennett, Anthony Collins

NLJ Career Profile: Kadie Bennett, Anthony Collins

Kadie Bennett, senior associate at Anthony Collins and chair of the Resolution West Midlands Group, discusses her long-standing passion for family law and calls for unity in the profession

Osborne Clarke—Lara Burch

Osborne Clarke—Lara Burch

Firm appoints new UK senior partner for 2026

Keoghs—Louise Jackson & Katie Everson

Keoghs—Louise Jackson & Katie Everson

Healthcare and sports legal team expands in the north west

NEWS
Lawyers and users of the business and property courts are invited to share their views on disclosure, in particular the operation of PD 57AD and the use of Technology Assisted Review (TAR) and artificial intelligence (AI)
Social media giants should face tortious liability for the psychological harms their platforms inflict, argues Harry Lambert of Outer Temple Chambers in this week’s NLJ
Ian Gascoigne of LexisNexis dissects the uneasy balance between open justice and confidentiality in England’s civil courts, in this week's NLJ. From public hearings to super-injunctions, he identifies five tiers of privacy—from fully open proceedings to entirely secret ones—showing how a patchwork of exceptions has evolved without clear design
The Leasehold and Freehold Reform Act 2024—once heralded as a breakthrough—has instead plunged leaseholders into confusion, warns Shabnam Ali-Khan of Russell-Cooke in this week’s NLJ
The Employment Appeal Tribunal has now confirmed that offering a disabled employee a trial period in an alternative role can itself be a 'reasonable adjustment' under the Equality Act 2010: in this week's NLJ, Charles Pigott of Mills & Reeve analyses the evolving case law
back-to-top-scroll