Academia.eduAcademia.edu

Outline

Counteracting Cybercrimes in Florida

2024, Journal of Information Technology, Cybersecurity, and Artificial Intelligence

https://doi.org/10.70715/JITCAI.2024.V1.I1.001

Abstract

This article explores Florida's high rate of cybercrime and the efforts being made to combat it. Florida has the secondhighest rate of cybercrime events in the United States, with significant financial losses. The most frequent dangers are call center frauds, ransomware, investment fraud, and business email compromise. Strong defense tactics, including multi-factor authentication, safe password policies, cybersecurity training, frequent software upgrades, network segmentation, and dependable backups, are emphasized throughout the text. It also emphasizes how important it is to have efficient incident response procedures, promote teamwork, and use continuous monitoring to lessen cyberthreats. The essay goes on to discuss the vital role that international collaborations and law enforcement play in the battle against cybercrime.

FAQs

sparkles

AI

What key trends were observed in investment scams in 2022?add

Investment scams reported to IC3 surged by 127%, with losses increasing from $1.45 billion in 2021 to $3.31 billion in 2022, largely driven by cryptocurrency fraud.

How did ransomware complaints change in 2022, and what were the losses?add

In 2022, IC3 received 2,385 ransomware complaints, leading to financial losses of over $34.3 million, highlighting ransomware as a persistent threat.

What roles do call center scams play in Florida's cybercrime statistics?add

Florida's call center scams significantly impacted elderly victims, who comprised 46% of victims and accounted for 69% of over $724 million in losses in 2022.

How has the nature of business email compromise (BEC) evolved?add

BEC scams have shifted from basic email spoofing to sophisticated schemes involving impersonation of vendors and types of communication beyond emails, such as phone calls.

What preventive measures can mitigate cybercrime risks effectively?add

Implementing multi-factor authentication, regular software updates, and incident response plans are critical strategies identified for effectively reducing risks associated with cybercrime.

References (14)

  1. Basic Awareness: Introduce foundational concepts about common cyber threats like phishing, malware, and ransomware. Teach users about creating strong passwords and the risks of reusing them.
  2. Ongoing Training: Conduct frequent training sessions to inform employees about emerging threats and best practices. Simulate phishing attacks to train employees on recognizing suspicious activities. Establish Policies: Define clear policies covering acceptable use, data security, and incident response, ensuring employees understand their roles through continuous education.
  3. Mobile Device Security: Train staff on securing mobile devices using encryption, strong authentication, and regular software updates.
  4. Securing Remote Work: As remote work expands, guide employees on securing home networks and utilizing virtual private networks (VPNs) and multi-factor authentication (MFA).
  5. Incident Response: Prepare employees to respond effectively to cyber incidents by promptly reporting and mitigating damage. Up-to-date Resources: Ensure training materials reflect the latest cyber threats and technologies.
  6. Fostering Security Culture: Promote a culture where all employees recognize their role in maintaining a secure environment.
  7. I.T. Collaboration: Establish strong communication between technical staff and non-technical employees, encouraging reporting of suspicious activity. Gamification: Incorporate interactive elements into training to enhance engagement.
  8. 2 Strong Password Policies Strong password policies are essential for safeguarding sensitive information. Implementing such policies prevents unauthorized access and strengthens overall security: Password Length: Set minimum lengths, typically starting at eight characters, and encourage using longer, more complex passphrases. Complexity: Require combinations of upper and lowercase letters, numbers, and symbols to avoid easily guessable patterns. Regular Expiration: Mandate password changes at intervals, commonly every 90 days. Password History: Prevent users from reusing old passwords within a specific number of changes. Account Lockout: Implement lockout policies after several failed login attempts to protect against brute-force attacks. Two-Factor Authentication (2FA): Enforce 2FA to add a security layer. User Education: Educate users on creating secure passwords and avoiding phishing threats. Password Storage: Use industry-standard methods such as hashing with salted algorithms to store passwords securely. Monitoring and Auditing: Regularly audit user accounts to identify weak or compromised passwords. Recovery Mechanisms: Implement secure password recovery options. Security Assessments: Conduct regular assessments to identify weaknesses in password management. Encryption: Encrypt communications related to password management to prevent interception. Journal of Information Technology, Cybersecurity, and Artificial Intelligence, 2024, 1(1), 1-8
  9. Caneppele, S., & Silva, A. d. (2022). Cybercrime. doi:https://doi.org/10.4337/9781839106385.00024
  10. Farrell, G., & Birks, D. (2018). Did cybercrime cause crime to drop? Crime Science, 7(1). doi:doi: 10.1186/S40163- 018-0082-8
  11. FBI. (2023, March 22). Internet Crime Complaint Center Releases 2022 Statistics. Retrieved from fbi.gov: https://www.fbi.gov/contact-us/field-offices/springfield/news/internet-crime-complaint-center-releases- 2022-statistics
  12. IC3. (n.d.). Internet Crime Report 2022. Retrieved from ic3.gov: https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf
  13. Kirwan, G., & Power, A. (2013). Cybercrime: Psychology of cybercrime.
  14. Suja, P., & Raghavan, N. (2013). cybercrime in the banking sector. International journal of research in social sciences, 4(1), 189-194.