Close

Reply To: OCU C)DFE Week 01 Discussion

#86177
Kelly Crooks
Participant

As Kevin stated there are countless cases involving computer fraud and cybercrime. The case I found interesting happened in November of 2022 and involved the Government of Costa Rica. Hackers using ransomware were able to gain access to the government’s critical systems for weeks. The Costa Rica government declared a state of emergency during this time. Because of the attack, the government was unable to pay its workers on time. The fraud case was so bad that it affected the tax and customs system as well causing the country’s import/export logistics to collapse.

It was determined that the Conti ransomware gang was responsible for the attack and they demanded $20 million in ransom payment. The gang claims to have stolen an estimated 50% of the government’s data during the weeks-long attack.

As cybercriminals get smarter and technology advances I think some of the things that could have been done to help stop this kind of fraud would be better security policies and procedures, stronger forms of authentication, and making sure your security officer is trained and up to date to be able to recognize an attack and how to mitigate the theft or fraud. Another step to help prevent fraud attacks is to regularly test your system and practice scenarios just like this one to determine if your system is hackproof and/or what needs to be put into place to change the security of your data.

Reference

The 13 Costliest Cyberattacks of 2022: Looking Back

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!