The current situation and cyber attacks
The criminal attacks of viruses, hackers, scammers, and other modern agents that represent threats to people and businesses have generated a search for computer security that seems to have no end.
Have a contingency plan, train employees on the subject, install sophisticated systems. All this time ago was a luxury for a person or a business, but today is a necessity.
In times when all private personal or business information is hit by a click, exposed on the network, there are more cases of information theft and private images, and even risk of one's life.
There is a real "social engineering," which combines doses of psychology, which those unscrupulous use to deceive someone. All in order to remove confidential information, to take possession of the content of your computer device, or to know habitual habits that constitute a weakness in security.
The most well-known and frequent case of electronic fraud is phishing. A practice in which wrongdoers steal passwords and account numbers through emails and forms with which they deceive users.
What are the characteristics of computer crimes?
- Research shows that year after year crimes are more complex, and they mix the virtual world and the real world. Many times, what begins as a process in the network, ends in a robbery in a place of business, a kidnapping, etc.
- The lack of knowledge about the exposure and the risks to which an Internet user is exposed has multiplied the risk of crime. Either by their use of email, by participation in social networks, by access to websites. And this coupled with the fact that everyone today has a technological device with connection.
- Children and adolescents, by their natural tendency to socialization even with strangers, are increasingly easy target for offenders.
- There are companies that are especially persecuted by computer evildoers. These include the pharmaceutical, chemical, electronic and financial sector businesses. In recent years it has been affecting state-owned enterprises, especially those linked to justice and public safety.
A state issue
The subject of computer security has become a state issue in many countries. They have realized that a state policy is needed to monitor and address inter-institutionally the issue of increasing cybercrime.
An example of this is the collaborative agreement on computer security signed by the General Council of the Judiciary and the National Intelligence Center of Spain.
The objective of this agreement is to safeguard the information of the Judicial Power through technological systems that allow to detect and to prevent threats from Internet.
To this end, it is agreed that the Judicial Branch shall be provided with the appropriate means that the specialized agency deems appropriate. It is about ensuring efficient processes for secure storage, processing and transmission of information. The training of officials of both entities is also foreseen.
Surely, the example of a collaborative model between the CGPJ and the CNI will be imitated by other organisms in the world.
Writings SF Lawyers