[ Browse by Service Category : Topics Related to Internet Information Resources (95) ]

Cybercrime Prevention

Programs that help individuals and organizations protect their Internet connection or mobile phones and other telecommunications devices from vulnerability to hacking, phishing, spamming or other offences, such as their identity or tools being used by others to commit a crime. Security measures include use of strong passwords; activating the computer's firewall; installing and updating anti-virus/malware and spyware detection software; avoiding unsolicited emails and suspicious text messages; avoiding public Wi-Fi; protecting personal information on social media; shutting down computers when they aren't being used; locking mobile devices; and encrypting confidential data to keep it secure. Bank and credit card statements should be promptly reviewed for suspicious activity. Organizations may also face malicious (or unintentional) threats from current or former employees, vendors, contractors, visitors or others trusted by the organization with access to their facilities, equipment or systems. This may negatively impact the integrity, confidentiality, and availability of the organization, its data, personnel, facilities and associated resources. Effective insider threat mitigation programs are prevention-focused and can detect improper or illegal actions, assess threats to determine levels of risk, and implement solutions to mitigate potential consequences.

[ View Programs and Services (1) | Related Topics ]

Cybercrime Reporting

Programs that provide a hotline, website or other mechanisms that people can use to anonymously report cases in which computers, laptops, tablets, mobile phones or other personal devices have been or are being used to commit a crime such as distribution of child pornography; cyberstalking or harassment; unauthorized interception of communications; intellectual property violations; or illegally accessing other computer systems to alter, destroy or steal data; intercept and disclose confidential information; plant spyware, ransomware or other forms of malware; launch denial of service attacks; or engage in phishing or smshing, financial theft or other activities that are illegal.

[ View Programs and Services (1) | Related Topics ]

The above terms and definitions are part of the Taxonomy of Human Services, used here by permission of INFO LINE of Los Angeles.


Any omissions are unintentional and HIP disclaims any liability for unauthorized use or reproduction of any portion of this site. For a complete copyright and license statement please refer to our Terms of Use.