Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Recent Data Shows Surprising Trends in Cybercrime Victimization

Recent Data Shows Surprising Trends in Cybercrime Victimization

When it comes to who is victimized in cybercriminal efforts, there may be a few stereotypes and presumptions that a lot of people may hold. A recent report, Oh, Behave!, released by the National Cybersecurity Alliance and Cybsafe, shows that the real victims of many forms of cybercrime aren’t who many would expect.

Let’s break down what Oh, Behave! indicates.

Cybercrime Victimization is a Complicated Subject

First off, surveyed participants overwhelmingly agreed that their online security was a priority—78% reporting in the affirmative, an excellent sign.

That being said, only half of respondents felt that remaining secure online was possible or under their control, with just under half claiming that doing so was either frustrating or intimidating. This is not the attitude you want present in your business, protecting the data that could potentially end your business if it were to be breached.

This Research Also Revealed Who Was Most Prone to Different Scams

Across effectively all forms of cybercriminal attack the survey covered—phishing, identity theft, romance scams, and cyberbullying—it was the younger generations, Gen Z and Millennials, who were most often victimized, or at least reported it most often.

Fortunately, many people are willing to report when they have been victimized, at least when it comes to phishing (69% reporting, as compared to 31% who did not report) and identity theft (74% reporting, as compared to 26% who did not report). Less promising were the reporting/not reporting rates for romance scams with 55% reporting, 45% not reporting, and cyberbullying with 52% reporting, and 48% not reporting, respectively.

It Is So Important to Train Your Team Members to Do Better

We can help. Reach out to us to learn more about how we can help teach your team to be more secure. Give us a call at 800.618.9844 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 22 February 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Phishing Google Workplace Tips Computer Users Collaboration IT Services Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Workplace Strategy Small Business Microsoft Communication Data Backup Smartphone Saving Money Passwords Android Business Management Smartphones VoIP communications Mobile Devices Backup Upgrade Managed Service Data Recovery Browser Managed IT Services Microsoft Office Social Media Disaster Recovery Windows Network Tech Term Remote Internet of Things Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Managed Service Provider Remote Work Miscellaneous Gadgets Productivity Current Events Server Information Holiday Outsourced IT Encryption AI Employee/Employer Relationship Spam Windows 10 Government Data Management Training Business Continuity Compliance Office Blockchain Wi-Fi Windows 10 Virtualization Business Technology Bandwidth Mobile Office Two-factor Authentication Apps Data Security Mobile Device Management Vendor Gmail Chrome Managed Services Employer-Employee Relationship Budget Voice over Internet Protocol Apple Networking App Marketing BYOD Computing Applications Information Technology Access Control WiFi Office 365 Tip of the week Conferencing Hacker How To BDR Avoiding Downtime Website Operating System HIPAA Router Risk Management Virtual Private Network Health Help Desk Big Data Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Computers Managed IT Services Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Firewall Display Printer Windows 11 The Internet of Things Paperless Office 2FA Infrastructure Monitoring Excel Social IT Support Document Management Remote Workers Telephone Scam Customer Service Data loss Cooperation Free Resource Project Management Windows 7 Multi-Factor Authentication Robot Mobility Telephone System Cost Management Settings Word Wireless Printing Content Filtering IT Management YouTube Meetings VPN Employees Physical Security Integration Cryptocurrency Modem User Tip Processor Safety Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Supply Chain Data Storage Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Customer Relationship Management Managed IT Service Maintenance Sports Downloads Antivirus Mouse iPhone Hacking Licensing Presentation Data Privacy Entertainment Administration Vulnerabilities Wireless Technology Images 101 Travel Social Networking Vendors Legislation Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Recovery Cortana Be Proactive Alt Codes Content Remote Working Hard Drives Wearable Technology Memory Workforce Domains Downtime Unified Threat Management Motherboard Data Breach Threats Comparison Google Play Health IT Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Workplace Strategies Typing Refrigeration Wasting Time Meta Public Speaking Trend Micro Amazon Network Congestion Specifications Security Cameras Google Drive User Error Microchip Lithium-ion battery Internet Exlporer Software as a Service Knowledge Fraud Entrepreneur Username Managing Costs Outsource IT Point of Sale eCommerce Environment 5G Black Friday SSID Media Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Bitcoin Network Management Undo Running Cable Tech Support IT Technicians Virtual Machine Small Businesses Cookies Displays Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Tactics Development Hotspot Transportation Outsourcing Windows 8 Laptop Websites Mirgation Hypervisor Drones Shopping Nanotechnology Optimization PowerPoint SharePoint Addiction Application Electronic Medical Records Language Employer/Employee Relationships Workplace Halloween Chatbots Hiring/Firing Navigation Management PCI DSS Lenovo Gig Economy IBM Screen Reader Writing Distributed Denial of Service Paperless Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Co-managed IT Scary Stories Private Cloud Identity Technology Care Evernote Hacks Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Fun Business Communications Deep Learning Download Net Neutrality Twitter Alerts SQL Server Scams Error History Hybrid Work Financial Data Competition Browsers Smartwatch Education Connectivity IT Social Engineering Break Fix Human Resources Upload Procurement Remote Computing Azure Cables Cyber security Multi-Factor Security Tech Mobile Computing Social Network Telework CES Tablet IoT Communitications User Search Dark Web Google Apps Best Practice Trends Supply Chain Management Alert IT Maintenance Buisness File Sharing Regulations Business Intelligence Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Legal Data Analysis IP Address IT solutions Star Wars IT Assessment How To Microsoft Excel Shortcuts Business Growth Gamification Flexibility Notifications Staff Value Ransmoware

Blog Archive