TOP 10 cybercrime myths




Like any other actual life sphere, there are also many myths about the hacker attacks. We have decided to rank the most common misconceptions about cybercrimes to help you realize the need for effective measures to ensure your business` cybersecurity.

Cybercrime is everywhere, according to one Cybersecurity Ventures report, the damage suffered by hackers is expected to double from $ 3 trillion in 2015 to 6 trillion by 2021.

According to a McAfee report on 2016 ransomware attacks, a hacker has managed to steal $ 121 million in just six months.

Although many cybercrimes are taking place every second around the world, people often believe in myths that put them at risk of a serious hacker attack.

Myth # 1

Only large companies are at risk

No one is immune. Cybercrime is a threat to all - people and businesses of all sizes. A new 2016-2017 Radware`s security report found that 98% of organizations survived the cyber-attack in 2016.

31% of these attacks were committed against small and medium-sized businesses with less than 250 employees.

Myth # 2

The danger is exaggerated

According to a McAfee Labs` cyber-attack threats report, mid-sized organization (1,000–3,000 employees) encounters 11–20 incidents in a single day.

Larger organizations (3,001 - 5,000 employees) experience 21-30 incidents per day and the largest organizations (with more than 5,000 employees) - 31-50 incidents per day.

Myth # 3

Bad guys are outsiders

According to a Radware report, approximately one-third (27%) of all incidents were caused by insiders due to malicious or accidental action. However, according to some experts, their number is much higher and steadily growing. In fact, consumers are often unaware and hacker fraud is easy to handle.

In a new study, Verizon estimates that 30% of the phishing messages were opened by the target across all campaigns. Something much worse - 12% of them even continued to click on the malicious attachment or link and thus actually allowed the attack to succeed. That is why it may be time to apply the social engineering tests in your company.

Myth # 4

Companies are ready to fight cybercrime

A new study by BMC and Forbes found that 68% of companies are planning to improve their incident response capabilities in the next 12 months. In fact, this is a rather late decision, and companies will be unprepared for at least a year, through which hackers can steal everything.

Another conclusion of the report is that 40% of companies do not have incident response plans and 70% do not have cyber-attacks insurance.

Myth # 5

Our computers have encryption and antivirus programs, we are safe

Even so, we have very bad news. The forecast is that computers will only play a small role by 2020, as the majority of consumers will mainly use mobile devices such as tablets and smartphones.

Cisco predicts that wireless and mobile traffic will account for 66% of all IP traffic worldwide. Data stored on connected devices will be will be five times higher than data stored in data centers. Devices are used in an extremely insecure environment, including Wi-Fi hotspots where hackers can easily penetrate.

According to a report by Ernst & Young, every year millions of smartphones are being stolen or lost. 22% of the total number of mobile devices produced will disappear and more than 50% of them will never be recovered.

Myth # 6

I can do it without cybersecurity

This myth, unfortunately, can cost you everything. Ensuring the security of your data and money is a matter of a complex solution that necessarily involves the professional actions of cybersecurity experts. They are the only ones who can make a real check and make a trusted report on the vulnerabilities of your networks, systems, and applications. Without performing professional penetration tests, you will never be able to understand how hackers can infiltrate your business and take everything away.

Myth # 7

We have a great firewall and network protection, so we are cool

The F5 Networks survey results show that 57% of the problem comes from the application layer. The frequency and severity of attacks on the application layer are considered to be much greater than at the network layer.

55% said the application was attacked more frequently, and 58% believed that these attacks were heavier than those on the network layer. There is also a large discrepancy in budget allocation: an average of 18% of IT security funds are allocated to application security, and 39% of the amount is spent on network security.

Myth No. 8

The new generation is digital and much more cautious

It is a common myth that the young generation is born with digital knowledge and is technically literate enough to protect the corporate data.

In fact, it’s likely going to be the opposite. Young people tend to worry less about the privacy of their lives. But they have to be better informed about today's cyber-threats because they have a completely different mindset where life is all about sharing – via social media and other channels that aren’t necessarily secure.

Myth No. 9

Strong passwords solve the hacking problem

Strong passwords are required for your cybersecurity, but only when combined with other measures, such as a two-factor authentication, for example.

However, if strong passwords are too complex to remember, or if users have to change them too often, they will not be able to remember them. Then they will start writing them somewhere, so they will bypass even the most complex security tools.

Myth # 10

We hire several IT gurus and everything is fine

The lack of staff remains the main problem when talking about fighting cybercrime. Although 47% of executives interviewed by BMC and Forbes in 2017 are willing to devote more resources, the dramatic question is how to find them.

A Trustwave 2016 report states that 57% of respondents find it extremely difficult to find qualified IT security staff. Another serious problem has 35% of the respondents and this is retaining these specialists.

Cyber Security Ventures reports a very serious lack of cybersecurity staff, with 1 million vacancies available in 2016. The shortage of such professionals is expected to reach 1.5 million by 2019. For this reason, it is actually better to choose and trust external cybersecurity company to take care of your business regularly not to be hit by a cybercrime.

Would you like to comment on this article?


Latest articles


75% of applications have at least one vulnerability

Developers, however, are not the only ones to blame.


Guide for GDPR compliance

In May 2018, the General Data Privacy Regulation (GDPR) will take effect, significantly changing the way organizations process and store data.


BEURK - Experimental Unix RootKit

BEURK is an user-land preload rootkit for GNU/Linux.

Sign up for our online newsletter!