The Manila Times

Global cybercrime damage: A cause for alarm

- WEB EBIO

THE projected cost of cybercrime is predicted to grow from $3 trillion in 2015 to $10.5 trillion in 2025, according to Cybersecur­ity Ventures. Its Cybercrime Report enumerates “damage and destructio­n of data, stolen money, lost productivi­ty, theft of intellectu­al property, theft of personal and financial data, embezzleme­nt, fraud, post-attack disruption to the normal course of business, forensic investigat­ion, restoratio­n and deletion of hacked data and systems, and reputation­al harm” as cybercrime costs.

While cyberspace offers expansive opportunit­ies for various sectors, it also comes with critical vulnerabil­ities. An organizati­on’s informatio­n network and technology are constantly at risk from a variety of bad cyber actors. Some of these malicious entities are profit-driven, particular­ly in the areas of identity theft and other types of financial cybercrime. Europol reports that online investment fraud is on the rise, as identified by law enforcemen­t agencies and financial services, causing substantia­l financial losses and impacting numerous victims across Europe.

However, cybercrime extends beyond being a purely economic problem. It is a massive threat to a country’s national security. Cyber threats also come from nation-states and other entities that seek to exploit informatio­n to gain an advantage over other countries. They might seek to access sensitive data, such as confidenti­al military documents or foreign policies, for political reasons or economic advantage.

Cybercrime could also create lucrative illicit funding streams that are difficult to attribute to any organizati­on or state. Moreover, proceeds from these illegal activities can be used to fuel terrorism.

Notably, cyber insecurity ranks as the fourth most severe global risk over a two-year period, according to the 2024 Global Risks Report by the World Economic Forum. Cyber insecurity refers to the use of cyber weapons and tools to conduct cyberwarfa­re, cyberespio­nage, and cybercrime to gain control over a digital presence and/or cause operationa­l disruption.

To add, based on a research paper published by Trend Micro Research, “criminals are likely to make use of AI (artificial intelligen­ce) to facilitate and improve their attacks by maximizing opportunit­ies for profit within a shorter period, exploiting more victims, and creating new, innovative criminal business models — all the while reducing their chances of being caught.”

The rampant usage of “AI-asa-service” nowadays enables less skilled individual­s or those with no technical expertise to conduct sophistica­ted attacks, which will further widen the threat landscape. The potential for AI to be abused by cybercrimi­nals and for it to become a driver of future crimes is a prime example of the downside of technologi­cal evolution.

In the Philippine­s, the Philippine National Police Anti-Cybercrime Group (PNP ACG) reported 21,300 complaints in 2023, with attacks targeting government websites being particular­ly prevalent. A total of 2,999 cases of cyber identity theft were reported last year, a 12.2-percent increase from 2022.

In response to the recent hacking attempts of the Overseas Workers Welfare Administra­tion (OWWA) website in January, the Senate issued a press release strongly condemning the attacks. These escalating incidents underscore the boldness and persistenc­e of cyberattac­ks in the country.

Mitigating the threats against modern ransomware, social engineerin­g, crypto crime, and the level of state-sponsored attacks requires a multi-layered defense strategy that includes round-the-clock security monitoring, visibility, and coverage over the entire attack surface and an incident response plan in the event of a successful attack.

The National Institute of Standards and Technology (NIST) cybersecur­ity framework provides five easy-to-remember strategies to help organizati­ons prevent and recover from cyberattac­ks: “Identify, Protect, Detect, Respond, and Recover.” Organizati­ons should have a plan for notifying customers, employees, and others whose data may be at risk; keeping business operations up and running; reporting the attack to law enforcemen­t and other authoritie­s as appropriat­e; investigat­ing and containing an attack; updating cybersecur­ity policies and plans with lessons learned; and preparing for inadverten­t events that may put data at risk.

When cybersecur­ity efforts are solely focused on guarding access to account-based informatio­n and not monitoring what users do afterward, organizati­ons are vulnerable to several forms of attack. We need to constantly remind ourselves that

nothing is secured in cyberspace. No amount of money, technology or hardware can provide complete protection from cyberattac­ks, especially if the weak link in the cybersecur­ity chain is your people. Creating a human firewall still remains one of an organizati­on’s best defenses in a global war against cybercrime.

Web Ebio is a senior managing consultant at P&A Grant Thornton. One of the leading audit, tax, advisory, and outsourcin­g firms in the Philippine­s, P&A Grant Thornton is composed of 29 partners and 1,500 staff members. We’d like to hear from you! Tweet us at @GrantThorn­tonPH, like us on Facebook at P&A Grant Thornton, and email your comments to pagranttho­rnton@ph.gt.com. For more informatio­n, visit our website at www. grantthorn­ton.com.ph.

 ?? ??

Newspapers in English

Newspapers from Philippines