Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Cyber crimes shift to hacktivism, report finds
Friday - 3/23/2012, 10:19am EDT
"In the case of hacktivism, the motivation of these crimes is to damage the reputation of the victim. They're retaliation or they have a political motivation to them, and that means these crimes can play out in many hundreds of different ways," said Bryan Sartin, Verizon's director of investigative response and one of the report's principal authors, in an interview with The Federal Drive with Tom Temin.
The shift to continuous monitoring to detect cyber crime is useful as long as "you know what you're looking for," Sartin said.
On average, it takes six months from the initial cyber intrusion to the time the victim finds out about the breach, he said. He added that more than 85 percent of cyber victims find out about a breach from a third party.
"So many people get caught up looking for the needle in the haystack when it comes to monitoring, but if you know what crimes look like, in fact, it's not about needles at all. It's really about looking for haystacks," Sartin said.
Sartin said the concern over state-sponsored cyber attacks is a real threat but also "over-hyped."
The report found financially-motivated crime generally targeted small to mid-sized businesses with 10 to 100 employees.
"What you see if more repetitive electronic crimes targeting more, smaller entitles," he said.
Sartin added the total damages is "overall much lower" than the past.
Because the crimes yield smaller damages, these hacker often "fly off the radar of law enforcement," he said.
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.