Cybercrime Training and Prevention

This topic is part of Cybercrime
  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 1-15 of 45 results

   
   
Publication

The Ransomware Playbook and How to Disrupt It

Authors

Year

  • 2025

Description

  • Over the years, ransomware groups have improved their ‘playbooks’. This report looks at …

 

The Ransomware Playbook and How to Disrupt It

Over the years, ransomware groups have improved their ‘playbooks’. This report looks at government actions that aim to counter this new ransomware playbook. Based on the Virtual Routes Ransomware Countermeasures Tracker and insights from Ransom War: How Cybercrime Became a Threat to National Security, the report highlights what is working, what is […]

Publication

How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)

Authors

Year

  • 2017

Description

  • The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach …

 

How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)

The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach incident and to prevent it. The guide is structured in the following sections: Information leakage: concepts, origin and causes. The consequences of an information leak. Estimating the impact. […]

Publication

Risk Management, a Beginner’s Guide for SMEs (Gestión de riesgos. Una guía de aproximación para el empresario)

Authors

Year

  • 2017

Description

  • This guide aims to help the entrepreneur to approach this process in a practical way with keys and s…

 

Risk Management, a Beginner’s Guide for SMEs (Gestión de riesgos. Una guía de aproximación para el empresario)

This guide aims to help the entrepreneur to approach this process in a practical way with keys and suggestions for assessing risks on a cost-benefit basis. The guide is structured in the following sections: Concepts where the terms used in risk management are introduced. Risk management, which includes the principles, […]

Publication

A Guide for Remote Working in SMEs (Ciberseguridad en el teletrabajo: una guía de aproximación para el empresario)

Authors

Year

  • 2020

Description

  • This guide has been developed so that any company that is going to use, or already uses remote worki…

 

A Guide for Remote Working in SMEs (Ciberseguridad en el teletrabajo: una guía de aproximación para el empresario)

This guide has been developed so that any company that is going to use, or already uses remote working is aware of the threats and circumstances that can lead to incidents in the event that the necessary security policies have not been correctly established for this purpose. In addition, this […]

Publication

A Beginers Guide for Cyberthreats against SMEs (Ciberamenazas contra entornos empresariales: una guía de aproximación)

Authors

Year

  • 2021

Description

  • This guide aims to show the main ways in which cybercriminals compromise the security of companies, …

 

A Beginers Guide for Cyberthreats against SMEs (Ciberamenazas contra entornos empresariales: una guía de aproximación)

This guide aims to show the main ways in which cybercriminals compromise the security of companies, and therefore its information assets and the systems that manage them. It describes the main cyber threats, how to avoid falling prey to them and, if you have suffered an incident, what to do.

Publication

Ransomware Guide for SMEs (Ransomware, una guía de aproximación para el empresario)

Authors

Year

  • 2021

Description

  • The aim of this guide is to learn how to detect a ransomware threat to avoid losing sensitive compan…

 

Ransomware Guide for SMEs (Ransomware, una guía de aproximación para el empresario)

The aim of this guide is to learn how to detect a ransomware threat to avoid losing sensitive company information and to implement appropriate measures for prevention and mitigation through the use of good practices. If the ransomware has breached the defensive barriers, this guide shows the main actions to […]

Publication

No country is an island: embracing international law enforcement cooperation to reduce the impact of cybercrime

Year

  • 2023

Description

  • With cybercrime as an inherently borderless form of crime, the article explores the roles different …

 

No country is an island: embracing international law enforcement cooperation to reduce the impact of cybercrime

With cybercrime as an inherently borderless form of crime, the article explores the roles different actors of international law enforcement cooperation have in countering cybercrime. The tools and platforms for global efforts to counter cybercrime offered by international law enforcement organisations include: information and intelligence exchange; capacity-development; and platforms for […]

Tool

Cyber Peace Tracer

Authors

Year

  • 2025

Description

  • The platform tracks and analyzes cyber incidents against civil society organizations, leveraging AI …

 

Cyber Peace Tracer

The platform tracks and analyzes cyber incidents against civil society organizations, leveraging AI to help raise awareness, mitigate threats and drive accountability. It also provides a high-level view of cyber threats and vulnerabilities. You can also find aggregated insights on the geographic distribution of incidents and the sectors most affected.

Tool

How to Build a Security Operations Center (on a budget)

Authors

Year

  • 2019

Description

  • With limited resources (time, staff, and budget), setting up a security operations center (SOC) supp…

 

How to Build a Security Operations Center (on a budget)

With limited resources (time, staff, and budget), setting up a security operations center (SOC) supported by multiple security monitoring technologies and near-real-time threat updates doesn’t seem all that DIY. In fact, you may doubt that you’ll have enough full-time and skilled team members to implement and manage these different tools […]

Tool

Ransomware Countermeasures Tracker

Authors

Year

  • 2025

Description

  • Governments worldwide have initiated various efforts to combat ransomware, a growing threat that dis…

 

Ransomware Countermeasures Tracker

Governments worldwide have initiated various efforts to combat ransomware, a growing threat that disrupts critical infrastructure, businesses, and individuals. These efforts range from international collaborations to national-level actions, including arrests, sanctions, botnet takedowns, and recovery of ransomware payments. However, the visibility and awareness of these initiatives vary significantly, often leaving […]

Publication

Cost of a Data Breach Report (2024)

Authors

Year

  • 2024

Description

  • IBM’s 2024 Cost of a Data Breach Report, now in its 19th edition, provides valuable insights to he…

 

Cost of a Data Breach Report (2024)

IBM’s 2024 Cost of a Data Breach Report, now in its 19th edition, provides valuable insights to help security and IT teams effectively manage risks and mitigate potential financial losses. Key findings from this 2024 research, conducted by the Ponemon Institute and analyzed by IBM, include: The methods through which […]

Publication

Cybersecurity Threats, Vulnerabilities and Resilience Among Women Human Rights Defenders and Civil Society in South-East Asia

Authors

Year

  • 2024

Description

  • Authored by Jaimee Stuart with contributions from Cara Antonaccio and Min Yang, and published by UN …

 

Cybersecurity Threats, Vulnerabilities and Resilience Among Women Human Rights Defenders and Civil Society in South-East Asia

Authored by Jaimee Stuart with contributions from Cara Antonaccio and Min Yang, and published by UN Women and the UN University Institute in Macau (UNU), the 2032 report “Cybersecurity Threats, Vulnerabilities, and Resilience Among Women Human Rights Defenders and Civil Society in South-East Asia“ takes a gendered, human-centered approach to […]

Publication

Global Cyber Expertise Magazine – Issue 12 – September 2024

Authors

Year

  • 2024

Description

  • The 12th edition of the Global Cyber Expertise Magazine provides comprehensive updates and insights …

 

Global Cyber Expertise Magazine – Issue 12 – September 2024

The 12th edition of the Global Cyber Expertise Magazine provides comprehensive updates and insights on global cyber capacity-building initiatives, policies, and developments. This issue highlights the vital work being carried out to secure critical infrastructures and digital economies worldwide. Featured content includes expert interviews and in-depth analyses on key cybersecurity […]

Publication

Ransomware Gangs and Hacktivists: Cyber Threats to Governments in Latin America

Authors

Year

  • 2024

Description

  • This report assesses ransomware gangs and hacktivists as the main cybersecurity threat to Latin Amer…

 

Ransomware Gangs and Hacktivists: Cyber Threats to Governments in Latin America

This report assesses ransomware gangs and hacktivists as the main cybersecurity threat to Latin American governments. The group’s objective is to expose corruption, abuse of power, and human rights violations in Latin America. The disclosure of this data significantly impacts public perception and the legitimacy of the affected governments, generating […]

Tool

ITU Global Cybersecurity Index (GCI) v5

Authors

Year

  • 2024

Description

  • The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countrie…

 

ITU Global Cybersecurity Index (GCI) v5

The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countries to cybersecurity at a global level – to raise awareness of the importance and different dimensions of the issue. As cybersecurity has a broad field of application, cutting across many industries and various sectors, each […]

30

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.