{"id":31632,"date":"2023-08-09T13:42:52","date_gmt":"2023-08-09T13:42:52","guid":{"rendered":"https:\/\/www.oxfordcorp.com\/?p=31632"},"modified":"2024-08-09T14:14:29","modified_gmt":"2024-08-09T14:14:29","slug":"cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too","status":"publish","type":"post","link":"https:\/\/www.oxfordcorp.com\/nl\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/","title":{"rendered":"Cybercrime is Evolving, So Cybersecurity Needs to Evolve, Too\u00a0"},"content":{"rendered":"<p><span data-contrast=\"auto\">In today\u2019s interconnected world, it has become increasingly important to have cybersecurity that extends to everyday items. With the abundance of electronic devices we regularly use, like laptops, smartphones, IoT gadgets, and more, these endpoints have become prime targets for cybercriminals seeking to exploit vulnerabilities and access sensitive data.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to Forbes, <\/span><a href=\"https:\/\/www.forbes.com\/sites\/chuckbrooks\/2023\/03\/05\/cybersecurity-trends--statistics-for-2023-more-treachery-and-risk-ahead-as-attack-surface-and-hacker-capabilities-grow\/?sh=218b347c19db\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">cybercrime is on the rise<\/span><\/a><span data-contrast=\"auto\"> owing to the heightened digital atmosphere. The publication reported stats acquired by Cybersecurity Ventures predicting the cost of cybersecurity in 2023 to reach $8 trillion. By 2025, this number is expected to increase to $10.5 trillion.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Therefore, device security is essential to protect against various threats, including malware, data breaches, unauthorized access, and network attacks. Robust security measures, including encryption, secure authentication, regular software updates, and network safeguards, help ensure the confidentiality, integrity, and availability of information stored on or transmitted through devices.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">User education and awareness also play a pivotal role in empowering individuals and organizations to adopt secure practices and recognize potential risks. Businesses prioritizing device security can safeguard their digital assets, maintain customer trust, and contribute to a safer and more resilient digital ecosystem.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Looking at the Numbers<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Cybercrime is growing, and its effects are staggering. Industry leaders are taking steps to protect their assets as damages reach the trillions. Cybersecurity Ventures predicts a spike in cybercrime costs, <\/span><a href=\"https:\/\/cybersecurityventures.com\/wp-content\/uploads\/2023\/04\/Security-Awareness-Training-Report-2023-1.pdf\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">growing by 15% in just two years<\/span><\/a><span data-contrast=\"auto\">. According to the company&#8217;s research, the projected setback is as high as $10.5 trillion annually by 2025.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The criminal ecosystem is at an expected $8 trillion in damages for 2023. As a result of those numbers, Cybersecurity Venture\u2019s most recent Security Awareness Training Report alleges that \u201ccybercrime [is] the world\u2019s third-largest economy behind the U.S. and China.\u201d\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to a 2023 Data Breach Investigations Report, <\/span><a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/2023\/summary-of-findings\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">attackers access data in three primary ways<\/span><\/a><span data-contrast=\"auto\">: stolen credentials, phishing, and exploitation of vulnerabilities. Most of these attacks (83%) involve external actors, largely for financial gain (95% of breaches). Additionally, 74% of data breaches are likely preventable as they predominantly involve human error, privilege misuse, stolen credentials, or social engineering (manipulating people into divulging confidential information).\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">The Evolution of Cybersecurity to Cover Devices<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Cybersecurity continuously evolves to cover devices as the digital landscape expands and becomes more interconnected. Traditionally, cybersecurity has focused on protecting networks and endpoints like computers, but with the rise of smart devices and the Internet of Things (IoT), the attack surface has significantly increased. As a result, cybersecurity strategies now encompass a broader range of devices, including smartphones, tablets, smart home devices, automobiles, industrial IoT sensors, medical devices, and even wearable tech. <\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Adopting a more holistic approach is one way cybersecurity is progressing to cover devices. Cybersecurity professionals now consider the entire ecosystem rather than just focusing on securing individual devices or networks. This all-encompassing method involves analyzing how devices interact with each other and with other components of the digital infrastructure. Implementing more effective defense mechanisms results from understanding this interconnected web&#8217;s dependencies and potential weak points.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Additionally, cybersecurity is shifting towards device-centric security solutions. More advanced endpoint protection systems that leverage machine learning and artificial intelligence (AI) are supplementing or replacing traditional antivirus software. These sophisticated tools can uncover and respond to emerging threats in real-time. These advanced systems can also identify anomalous behavior on devices, thereby detecting zero-day exploits and previously unknown malware.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Another significant aspect of the transformation of cybersecurity for devices is the growing emphasis on safeguarding IoT devices. These devices often have limited computing power and may lack standard security features. Cybersecurity experts are working to develop lightweight security protocols and standards specifically tailored to IoT devices, enabling safe communications and firmware updates.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In addition, the rapid growth of mobile devices, including smartphones and tablets, has spurred the adoption of mobile-focused cybersecurity measures. Mobile device management (MDM) solutions, secure containerization, and application sandboxing are now standard practices to safeguard devices and their data.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Finally, the convergence of operational technology (OT) and information technology (IT) in industrial settings has necessitated the integration of cybersecurity with device-level protection. Cyber-physical systems and critical infrastructure components require a more robust defense against cyber threats to ensure public safety and the continued operation of essential services.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Threats to Device Data<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">In today\u2019s digital landscape, cybercriminals use various techniques to compromise device data and exploit it for malicious purposes. Threats to device data are incredibly significant in business due to their potentially devastating consequences on an organization\u2019s operations, reputation, and financial health.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In our digital-driven world, businesses rely heavily on devices to store, process, and transmit sensitive data, including customer information, financial records, proprietary data, and intellectual property. A successful data breach or cyber attack can lead to the loss or theft of this critical information, resulting in financial losses, legal liabilities, and damage to the company\u2019s reputation.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In addition, the fallout from a data breach can lead to a loss of customer trust, diminished brand value, and a decline in customer loyalty. Cyberattacks can disrupt business continuity, causing downtime, service interruptions, and delays in operations. In highly competitive markets, stealing proprietary data or trade secrets can give competitors an unfair advantage.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In other words, threats to device data have no positive outcomes for businesses, meaning mitigating potential risks is best. To protect against these threats, companies must prioritize cybersecurity measures, implement comprehensive data protection strategies, and maintain a strong security posture to safeguard device data from possible cyber threats and ensure business resilience and continuity.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Common threats to device data include:<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Malware (e.g., viruses, ransomware, and spyware)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Phishing Attacks<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Web Application Attacks<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Unsecured Wi-Fi Networks<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Denial of Service<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Social Engineering<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Interconnectivity and IoT<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Physical Theft or Loss<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Privilege Misuse<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Default Credentials<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Target of Opportunity<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Software and Operating System Vulnerabilities (e.g., legacy systems, lack of firmware updates, complex software ecosystem, etc.)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Lack of Security Awareness (i.e., human error)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Rapid Technology Advancements\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">What About Medical Devices?<\/span><\/h2>\n<p aria-level=\"2\"><span data-contrast=\"auto\">Any device connected to the internet, including many medical devices, is at risk. The evolution of internet-connected medical devices transformed the healthcare industry. It started with the advent of basic remote monitoring tools that allowed healthcare professionals to gather vital signs and data from patients at a distance. These devices became more sophisticated and interconnected as technology progressed, enabling real-time data transmission and analysis. <\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The development of wearable health trackers and smartwatches further revolutionized the field, empowering individuals to monitor their health and fitness. These devices can track everything from heart rate and sleep patterns to activity levels, promoting a more proactive approach to personal well-being.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In addition, more accurate diagnoses and personalized treatment plans were made possible by introducing AI and machine learning algorithms in medical devices. The ability to analyze vast amounts of patient data in real-time has significantly enhanced the decision-making process for healthcare providers.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Finally, the rise of telemedicine and telehealth platforms has allowed remote consultations and monitoring, making healthcare accessible to individuals in remote areas and improving overall patient health outcomes. In short, the evolution of internet-connected medical devices has tremendously impacted healthcare by enriching patient care, increasing accessibility, and fostering a more data-driven approach to medicine.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, despite all the excitement surrounding the possibilities of internet-connected device-driven health initiatives, there are genuine concerns regarding data privacy and cybersecurity. In 2022, a report issued by the FBI noted <\/span><a href=\"https:\/\/www.ic3.gov\/Media\/News\/2022\/220912.pdf\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">increasing vulnerabilities in medical devices<\/span><\/a><span data-contrast=\"auto\"> lacking the necessary security features to thwart cyberattacks. The report found that 53% of digital medical devices and other internet-connected hospital products \u201c<\/span><a href=\"https:\/\/www.cnn.com\/2023\/03\/29\/tech\/fda-medical-devices-secured-cyberattacks\/index.html\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">had known critical vulnerabilities<\/span><\/a><span data-contrast=\"auto\">.\u201d<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">These findings follow previous investigations in 2021 by researchers and in 2018 by the U.S. Department of Health and Human Services Office of the Inspector General that determined the U.S. Food and Drug Administration (FDA) was lax in its approach to protecting medical devices from hacking. According to the subsequent FBI report, compromised devices&#8217; dangers include inaccurate readings, drug overdoses, and other risks that could endanger patient health.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As a result, in March 2023, it was reported by CNN Business that the <\/span><a href=\"https:\/\/www.fda.gov\/media\/166614\/download\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">FDA would now require specific cybersecurity guidelines to be met<\/span><\/a><span data-contrast=\"auto\"> to protect medical devices from hacks and ransomware attacks. Additionally, the FDA\u2019s guidance must be updated at least every two years to align with further advancements, meaning companies must regularly adjust their processes to ensure their devices&#8217; continued security.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Oxford Can Help Protect Devices<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">To protect company assets, businesses must strategically safeguard user data and build a more resilient and secure device environment. Oxford has the knowledge and expertise to <\/span><a href=\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\"><span data-contrast=\"none\">strengthen organizations\u2019 security measures<\/span><\/a><span data-contrast=\"auto\">, including implementing state-of-the-art encryption, authentication protocols, and intrusion detection systems. We can provide valuable insights and innovative approaches to fortify systems, detect vulnerabilities, and stay ahead of emerging threats.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Oxford promises to deliver <a href=\"https:\/\/www.oxfordcorp.com\/insights\/blog\/who-do-you-want-working-with-you-oxford-supplies-the-right-talent-right-nowr\/\">The Right Talent. Right Now. <\/a><\/span><span data-contrast=\"auto\">We take a proactive approach to getting you the help you need when you need it so you can carry on with business as usual. We can provide fast and efficient cybersecurity solutions for business leaders looking to evolve alongside our digital world with increased cyber risks. We will be with you <\/span><a href=\"https:\/\/www.oxfordcorp.com\/insights\/blog\/finding-solutions-the-oxford-way-were-with-you-every-step-of-the-way\"><span data-contrast=\"none\">every step of the way<\/span><\/a><span data-contrast=\"auto\"> as you step up your security\u2014that\u2019s our guarantee.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stay ahead of evolving cybercrime with effective cybersecurity measures. Protect your devices, sensitive data, and privacy from malicious attacks.<\/p>\n","protected":false},"author":22,"featured_media":31633,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[183],"tags":[266],"category-tag":[],"class_list":["post-31632","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-consumer-and-industrial-financial-services-healthcare-life-sciences-public-sector-technology-communications"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybercrime is Evolving, So Cybersecurity Needs to Evolve, Too\u00a0 - Oxford Global Resources<\/title>\n<meta name=\"description\" content=\"Stay ahead of evolving cybercrime with effective cybersecurity measures. Protect your devices, sensitive data, and privacy from malicious attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime is Evolving, So Cybersecurity Needs to Evolve, Too\u00a0\" \/>\n<meta property=\"og:description\" content=\"Stay ahead of evolving cybercrime with effective cybersecurity measures. Protect your devices, sensitive data, and privacy from malicious attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/\" \/>\n<meta property=\"og:site_name\" content=\"Oxford Global Resources\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-09T13:42:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-09T14:14:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2024\/08\/Cybercrime_is_Evolving_So_Cybersecurity_Needs_to_Evolve_Too-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"kcompton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"kcompton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/\"},\"author\":{\"name\":\"kcompton\",\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/42927b5e78a84b0692a4221cdc55bad5\"},\"headline\":\"Cybercrime is Evolving, So Cybersecurity Needs to Evolve, Too\u00a0\",\"datePublished\":\"2023-08-09T13:42:52+00:00\",\"dateModified\":\"2024-08-09T14:14:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/\"},\"wordCount\":1510,\"image\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2024\/08\/Cybercrime_is_Evolving_So_Cybersecurity_Needs_to_Evolve_Too-1.jpg\",\"keywords\":[\"Consumer and Industrial; Financial Services; Healthcare; Life Sciences; Public Sector; Technology &amp; Communications\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/\",\"url\":\"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/\",\"name\":\"Cybercrime is Evolving, So Cybersecurity Needs to Evolve, Too\u00a0 - Oxford Global Resources\",\"isPartOf\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2024\/08\/Cybercrime_is_Evolving_So_Cybersecurity_Needs_to_Evolve_Too-1.jpg\",\"datePublished\":\"2023-08-09T13:42:52+00:00\",\"dateModified\":\"2024-08-09T14:14:29+00:00\",\"author\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/42927b5e78a84b0692a4221cdc55bad5\"},\"description\":\"Stay ahead of evolving cybercrime with effective cybersecurity measures. Protect your devices, sensitive data, and privacy from malicious attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/#primaryimage\",\"url\":\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2024\/08\/Cybercrime_is_Evolving_So_Cybersecurity_Needs_to_Evolve_Too-1.jpg\",\"contentUrl\":\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2024\/08\/Cybercrime_is_Evolving_So_Cybersecurity_Needs_to_Evolve_Too-1.jpg\",\"width\":1600,\"height\":900,\"caption\":\"Cybercrime is Evolving So Cybersecurity Needs to Evolve Too 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.oxfordcorp.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime is Evolving, So Cybersecurity Needs to Evolve, Too\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#website\",\"url\":\"https:\/\/www.oxfordcorp.com\/de\/\",\"name\":\"Oxford Global Resources\",\"description\":\"Global\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.oxfordcorp.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/42927b5e78a84b0692a4221cdc55bad5\",\"name\":\"kcompton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2cd530781db51f88a48fa8c72240ebb3cd8fb42b119eeb9a6f6765b5764705cc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2cd530781db51f88a48fa8c72240ebb3cd8fb42b119eeb9a6f6765b5764705cc?s=96&d=mm&r=g\",\"caption\":\"kcompton\"},\"url\":\"https:\/\/www.oxfordcorp.com\/nl\/insights\/author\/kcompton\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybercrime is Evolving, So Cybersecurity Needs to Evolve, Too\u00a0 - Oxford Global Resources","description":"Stay ahead of evolving cybercrime with effective cybersecurity measures. Protect your devices, sensitive data, and privacy from malicious attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/","og_locale":"nl_NL","og_type":"article","og_title":"Cybercrime is Evolving, So Cybersecurity Needs to Evolve, Too\u00a0","og_description":"Stay ahead of evolving cybercrime with effective cybersecurity measures. Protect your devices, sensitive data, and privacy from malicious attacks.","og_url":"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/","og_site_name":"Oxford Global Resources","article_published_time":"2023-08-09T13:42:52+00:00","article_modified_time":"2024-08-09T14:14:29+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2024\/08\/Cybercrime_is_Evolving_So_Cybersecurity_Needs_to_Evolve_Too-1.jpg","type":"image\/jpeg"}],"author":"kcompton","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"kcompton","Geschatte leestijd":"7 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/#article","isPartOf":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/"},"author":{"name":"kcompton","@id":"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/42927b5e78a84b0692a4221cdc55bad5"},"headline":"Cybercrime is Evolving, So Cybersecurity Needs to Evolve, Too\u00a0","datePublished":"2023-08-09T13:42:52+00:00","dateModified":"2024-08-09T14:14:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/"},"wordCount":1510,"image":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2024\/08\/Cybercrime_is_Evolving_So_Cybersecurity_Needs_to_Evolve_Too-1.jpg","keywords":["Consumer and Industrial; Financial Services; Healthcare; Life Sciences; Public Sector; Technology &amp; Communications"],"articleSection":["Blog"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/","url":"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/","name":"Cybercrime is Evolving, So Cybersecurity Needs to Evolve, Too\u00a0 - Oxford Global Resources","isPartOf":{"@id":"https:\/\/www.oxfordcorp.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/#primaryimage"},"image":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2024\/08\/Cybercrime_is_Evolving_So_Cybersecurity_Needs_to_Evolve_Too-1.jpg","datePublished":"2023-08-09T13:42:52+00:00","dateModified":"2024-08-09T14:14:29+00:00","author":{"@id":"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/42927b5e78a84b0692a4221cdc55bad5"},"description":"Stay ahead of evolving cybercrime with effective cybersecurity measures. Protect your devices, sensitive data, and privacy from malicious attacks.","breadcrumb":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/#primaryimage","url":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2024\/08\/Cybercrime_is_Evolving_So_Cybersecurity_Needs_to_Evolve_Too-1.jpg","contentUrl":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2024\/08\/Cybercrime_is_Evolving_So_Cybersecurity_Needs_to_Evolve_Too-1.jpg","width":1600,"height":900,"caption":"Cybercrime is Evolving So Cybersecurity Needs to Evolve Too 1"},{"@type":"BreadcrumbList","@id":"https:\/\/www.oxfordcorp.com\/insights\/blog\/cybercrime-is-evolving-so-cybersecurity-needs-to-evolve-too\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.oxfordcorp.com\/"},{"@type":"ListItem","position":2,"name":"Cybercrime is Evolving, So Cybersecurity Needs to Evolve, Too\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.oxfordcorp.com\/de\/#website","url":"https:\/\/www.oxfordcorp.com\/de\/","name":"Oxford Global Resources","description":"Global","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.oxfordcorp.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Person","@id":"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/42927b5e78a84b0692a4221cdc55bad5","name":"kcompton","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2cd530781db51f88a48fa8c72240ebb3cd8fb42b119eeb9a6f6765b5764705cc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2cd530781db51f88a48fa8c72240ebb3cd8fb42b119eeb9a6f6765b5764705cc?s=96&d=mm&r=g","caption":"kcompton"},"url":"https:\/\/www.oxfordcorp.com\/nl\/insights\/author\/kcompton\/"}]}},"_links":{"self":[{"href":"https:\/\/www.oxfordcorp.com\/nl\/wp-json\/wp\/v2\/posts\/31632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oxfordcorp.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oxfordcorp.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/nl\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/nl\/wp-json\/wp\/v2\/comments?post=31632"}],"version-history":[{"count":0,"href":"https:\/\/www.oxfordcorp.com\/nl\/wp-json\/wp\/v2\/posts\/31632\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/nl\/wp-json\/wp\/v2\/media\/31633"}],"wp:attachment":[{"href":"https:\/\/www.oxfordcorp.com\/nl\/wp-json\/wp\/v2\/media?parent=31632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/nl\/wp-json\/wp\/v2\/categories?post=31632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/nl\/wp-json\/wp\/v2\/tags?post=31632"},{"taxonomy":"category-tag","embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/nl\/wp-json\/wp\/v2\/category-tag?post=31632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}