When it comes to cyber crime, stories are often told in numbers. By 2025, it is expected Cost of $ 10.5 trillion globally. If it was a country, its economy would have placed it in third place globally, only behind the US and Chinese economies. Money raised through online fraud – from fishing to fake websites – Total About $ 1.03 trillion. With the rise of ransomware and Financial attacks on big organizationsOne may think that cyber crime is only about money.
nothing could be further from the truth. Inspirations for these crimes are beyond the economic component, although it has an important weight. Some study Keep The percentage of attacks on governments was mainly inspired by financial reasons at 95% of all security violations, while others Speak Among the 55% groups working in search of income. The fact is that inspiration is not financial, it does not mean that the effect is not equally harmful, although in terms of the iconic cost, strategy, or significant infrastructure damage. Petricia Alonso Garcia, the manager of Incibe-CERT, states that “it is rapid to find other types of motivations that want to create the greatest possible media effects.” She cites ideological or political reasons in the first place, “With the aim of destabilizing an institution, government or company.” In the current international context, their influence is being felt: according to the latest World Economic Forum Report On cyber security, about 60% of organizations say geo -political stresses have affected their strategy, while one in three CEOs cite sensitive information and cyberpayan as their top concern.

Incibe. An La Imagene, Petricia Alonso Garcia.
“We are very meaningless when talking about cyber crime, because we always associate it with economic motivations,” says Harve Lambert, Global Consumer Operations Manager of Panda Security, because we always associate it with economic motivations. ” “But they are not only the reason there.” Lambert also refers to political and military cyber espionage, “various governments associated with states or actors” who want to infiltrate to obtain strategic information. It also includes cyberwarfare, “attacks designed to damage, disabled, make important systems useless. There is no attractive objective, but facilitates warning or winning or sabotage.”