According to ITProPortal, the cybercrime economy could be larger than Apple, Google and Facebook combined. The market has matured into an organized market that is probably a lot more profitable than the drug trade.

Criminals use innovative and state-of-the-art tools to steal details from substantial and small organizations and then either use it themselves or, most prevalent, sell it to other criminals via the Dark Net.

Onion links and mid-sized companies have turn into the target of cybercrime and information breaches due to the fact they don’t have the interest, time or funds to set up defenses to defend against an attack. A lot of have thousands of accounts that hold Personal Identifying Information and facts, PII, or intelligent property that may perhaps involve patents, research and unpublished electronic assets. Other tiny companies work straight with larger organizations and can serve as a portal of entry a lot like the HVAC firm was in the Target data breach.

Some of the brightest minds have developed inventive techniques to stop important and private facts from being stolen. These data security applications are, for the most element, defensive in nature. They fundamentally place up a wall of protection to retain malware out and the data inside secure and safe.

Sophisticated hackers uncover and use the organization’s weakest links to set up an attack

Regrettably, even the ideal defensive programs have holes in their protection. Right here are the challenges each organization faces according to a Verizon Data Breach Investigation Report in 2013:

76 percent of network intrusions explore weak or stolen credentials
73 % of online banking users reuse their passwords for non-economic web-sites
80 percent of breaches that involved hackers applied stolen credentials
Symantec in 2014 estimated that 45 percent of all attacks is detected by standard anti-virus meaning that 55 percent of attacks go undetected. The outcome is anti-virus software program and defensive protection applications cannot retain up. The negative guys could currently be inside the organization’s walls.

Smaller and mid-sized businesses can suffer greatly from a data breach. Sixty percent go out of company within a year of a data breach according to the National Cyber Safety Alliance 2013.

What can an organization do to defend itself from a information breach?

For several years I have advocated the implementation of “Best Practices” to shield private identifying facts inside the business enterprise. There are standard practices every small business should implement to meet the requirements of federal, state and sector rules and regulations. I’m sad to say really handful of compact and mid-sized businesses meet these standards.

The second step is something new that most organizations and their techs have not heard of or implemented into their protection applications. It requires monitoring the Dark Net.

The Dark Net holds the secret to slowing down cybercrime

Cybercriminals openly trade stolen data on the Dark Web. It holds a wealth of information that could negatively influence a businesses’ present and prospective consumers. This is where criminals go to invest in-sell-trade stolen data. It is easy for fraudsters to access stolen details they need to infiltrate business and conduct nefarious affairs. A single data breach could place an organization out of business enterprise.

Luckily, there are organizations that frequently monitor the Dark Internet for stolen info 24-7, 365 days a year. Criminals openly share this information by means of chat rooms, blogs, web-sites, bulletin boards, Peer-to-Peer networks and other black market place web pages. They identify information as it accesses criminal command-and-control servers from a number of geographies that national IP addresses can not access. The amount of compromised details gathered is amazing. For example:

Millions of compromised credentials and BIN card numbers are harvested every single month
Roughly one million compromised IP addresses are harvested each day
This data can linger on the Dark Net for weeks, months or, at times, years ahead of it is applied. An organization that monitors for stolen details can see nearly straight away when their stolen info shows up. The next step is to take proactive action to clean up the stolen information and facts and protect against, what could develop into, a data breach or small business identity theft. The information, essentially, becomes useless for the cybercriminal.

What would take place to cybercrime when most little and mid-sized enterprises take this Dark Net monitoring seriously?

The impact on the criminal side of the Dark Web could be crippling when the majority of businesses implement this program and take benefit of the data. The target is to render stolen data useless as immediately as possible.

There will not be significantly impact on cybercrime till the majority of compact and mid-sized corporations implement this kind of offensive action. Cybercriminals are counting on quite couple of firms take proactive action, but if by some miracle companies wake up and take action we could see a important impact on cybercrime.

Cleaning up stolen credentials and IP addresses is not difficult or complicated when you know that the information has been stolen. It is the businesses that don’t know their information and facts has been compromised that will take the largest hit.

Is this the greatest way to slow down cybercrime? What do you this is the very best way to shield against a data breach or small business identity theft – Solution one particular: Wait for it to take place and react, or Selection two: Take offensive, proactive methods to find compromised facts on the Dark Web and clean it up?