is a crime involving an attack or threat of attack against an enterprise, coupled
with a demand for money to avert or stop the attack.
Cyberextortion can take many forms. Originally, denial of service (DoS) attacks were the most common method. In recent years, cybercriminals have developed ransomware that can be used to encrypt the victim's data. The attacker then demands money for the decryption key.
As the number of enterprises that rely on the Internet for their business has increased, opportunities for cyberextortionists have exploded. The probability of identification, arrest, and prosecution is low because cyberextortionists usually operate from countries other than those of their victims and use anonymous accounts and fake e-mail addresses.
Cyberextortion can be lucrative, netting attackers millions of dollars annually. A typical attack may result in a demand for thousands of U.S. dollars. Payment does not guarantee that further attacks will not occur, either by the same group of cyberextortionists or by another group.
Through concerted, high tech efforts, a few cyberextortionists have been found, arrested, prosecuted, convicted and sentenced to prison. However, according to some reports, most cyberextortion episodes go unreported because victims don't want the publicity and that, furthermore, the majority of reported episodes don't result in arrests.
In addition to this blog, I maintain a radio show on BlogtalkRadio online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahooa member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County, NJ.
I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services. Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.
Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me email@example.com.
If you have not already done so, please view the trailer for my book below.