Cybercrimes as White-Collar Crimes
Cybersecurity issues and crimes are a big topic of concern for many businesses as continued reports of theft of personal and financial information continue to expand nationwide each year. Many cyber-crimes, committed by injecting malicious code through intrusions into internet networks, servers, and computers, fall under the White-Collar crime division, particularly when identity theft, credit, and banking information theft occur.
Cyberattacks that bring down a whole network where nothing can get done, including online purchasing infrastructures, are known as a distributed denial-of-service (DDoS). These are very costly to online commerce websites due to the loss of money that would typically come in during those times.
Mobile Phones are Vulnerable Too
Mobile phones are also falling victim to cybercrimes, such as in a recent case of uncovering an android application (app) that stole crypto assets from its users. The malware was known as a “Clipper,” according to a recent article by Forbes.com online. The app has quickly been removed from the Google Play store. Always check financial apps carefully by going to the online company link to make sure they are offering that app before installing it on your phone.
When Cyber-Crime Cases Go to Trial
Such crimes take a long time to track back, find victims of the crime, gather evidence and require expert cyber specialists who know what to look for so that a case can be made in the court system. One of the most recent famous cases filed in California in September 2018, was that of suspect Park Jin Hyok from North Korea. He is considered a major player behind the hacking of Sony Pictures in 2014, the 2016 hacking of the Bangladesh central bank, as well as the WannaCry ransomeware worm attacks in May of 2017. There is a warrant out for his arrest and the Federal Bureau of Investigation (FBI) have Park listed on their 10 Most Wanted List.
Protecting Yourself Against Cyber-Crime Charges
As stolen identities and credentials occur often, you must always be careful about what you do online, particularly while at work. One example is to never access an outside link, such as a social media website, while on your company computer at work.
Your company may advise you of this when you are first hired. It is easy for any hacker combing the internet to pick up on your link, especially when you are on an outside website that may provide an open door to your company’s internal infrastructure.
Your identity and sign-in credentials could be used to access the company so that it appears that you might have caused a hacking attack if something does go wrong. If the hacking attack occurs at a time when you would not be there, such as having signed out for the day, then this might prove that it was not you that caused the attack on the company’s system.
Yet, you could be in trouble if the company, in an investigation, sees what website you went to, where the hacker could have compromised your identity. It could be enough to get you fired from your job, even if it was just a case of innocent carelessness.
If you need to research something outside of the company’s secured intranet, use your own mobile phone or tablet, and mobile hotspot to access the internet for the information. Do not access the company’s internet infrastructure using your mobile phone or tablet as these personal devices do not have the security on them that the company’s devices have, which are installed by the company’s IT department.
If in doubt, always ask your manager what security protocols are in place for using your company computer to do various jobs, particularly when it comes to job-related research that must be done on the internet. Go the link to learn more about Federal Crimes and Penalties in California.
If you are charged with a cyber-crime, call us at once for a consultation. 619-234-2300