Newspaper article The Journal (Newcastle, England)

Don't Leave Your Databases Open to Abuse from within; David Arthur, Partner at Tait Walker and Forensic Accounting Specialist, Shares Some Thoughts on the Growing Trend of Computer-Enabled Crime within the North East and Provides Answers to Some Frequently Asked Questions

Newspaper article The Journal (Newcastle, England)

Don't Leave Your Databases Open to Abuse from within; David Arthur, Partner at Tait Walker and Forensic Accounting Specialist, Shares Some Thoughts on the Growing Trend of Computer-Enabled Crime within the North East and Provides Answers to Some Frequently Asked Questions

Article excerpt

| What is the difference between cyber-crime and computer-enabled crime? While the two types of crime are very different, they are often mistakenly thought of as the same thing.

Cyber-crime is more typically carried out by someone external to the organisation, often by hackers who are unknown. They will access internal systems using external hardware and software and are usually looking for personal data. Often this is to enable them to bargain with the organisation or to sell to third parties.

Computer-enabled crime is usually conducted by internal parties known to the organisation. Unfortunately, this is often trusted members of staff. The crime will be carried out using internal software and hardware, often stealing company databases in order to sell to competitors for financial gain.

| Who should I be wary of within my organisation? Anyone within an organisation could potentially steal your data. This could be a director, IT Manager, financial controller, administrative assistant, cleaner or anyone who has access to your data systems. Steps can be taken to limit the opportunities for potential fraudsters, but if the opportunity presents itself to the right person they may take advantage of the situation. In many of the cases that we have been involved in, it could be argued that if the opportunity had not been so visible, the fraud may never have occurred.

| What types of information are usually taken? Most types of data can be valuable in the wrong hands. Most employees will know their industry well and will therefore know potential targets to sell your data to. It is often considered that this type of crime is limited to companies with huge online databases but sadly this is not the case. Intellectual property, financial data, customer data, supplier data even staff data all has a price. All types of organisation hold data which is valuable and this type of crime could happen to any organisation. …

Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.