Introducing… The Cybercrime Support Network

Cybercrime is growing. Last year, CNBC called cybercrime the fastest growing crime in America.

Cybercrime is defined by Merriam-Webster as “criminal activity (such as fraud, theft, or distribution of child pornography) committed using a computer especially to illegally access, transmit, or manipulate data” or “an instance of such activity.” 

Others describe cybercrime as “online crime” or “criminal activity that is primarily carried-out in cyberspace or on the Internet.”  

Consider these cybercrime numbers from 2017:

  • 301,580 victims reported to FBI/IC3
  • 4 billion victim losses reported to FBI/IC3
  • 15% estimated number of victims who report cybercrime to FBI/IC3

So what’s being done to help victims of cybercrime? No doubt, there are many different answers to that question, but a new, coordinated answer has arrived that is gaining national attention, recognition, funding and other resources.

The Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet challenges facing millions of people and businesses affected each and every day by cybercrime

CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims…

  • Before, by pointing consumers and businesses to the best information from experts in cybersecurity education and awareness
  • During, by enabling a local, one-stop access to get someone on the phone who is empathic and responsive and can direct callers to the appropriate support based on crime type
  • After, by providing key contacts to guide in recovery and tools to prevent re-victimization

But before diving deeper into the Cyber Crime Support Network, let me tell you about CSN’s CEO and President, Kristin Judge.

Ms. Judge was a County Commissioner in Washtenaw County, Michigan, from 2008-2011. In October, 2011, she joined the MS-ISAC as their Director of Partner Engagement. In 2014, she joined (Read more...)

*** This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: