{"id":2695,"date":"2021-04-05T14:04:31","date_gmt":"2021-04-05T14:04:31","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=2695"},"modified":"2021-04-12T04:49:12","modified_gmt":"2021-04-12T04:49:12","slug":"key-findings-of-fbis-2020-internet-crime-complaint-centre-report","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/","title":{"rendered":"Key Findings of FBI\u2019s 2020 Internet Crime Complaint Centre Report"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>In 2020, we had more to fear than we thought<\/p>\n<p>2020 was filled with horrifying, and still lingering statistics.\u00a0 Not only did the sobering death tallies stagger the mind, but the lasting effects of those who are still suffering has resulted in the emergence of what are known as \u201c<a href=\"https:\/\/www.survivorcorps.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">long-haul<\/a>\u201d clinics. One would think that with such global turmoil the criminal activity would diminish a bit.\u00a0 Sadly, according to the <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">2020 Internet Crime Report<\/a> issued by the FBI, the statistics are quite the opposite.<\/p>\n<p>The report indicates that while everyone was working remotely, cybercriminals took advantage of the opportunities, causing the largest number of internet crimes ever recorded.\u00a0 Criminal internet activity rose by 69% compared to 2019, with losses exceeding 4.1 Billion dollars.\u00a0 It is important to remember that these statistics reflect the cases that were reported to the FBI.\u00a0 One can only wonder what the residual numbers of unreported cases would reveal.<\/p>\n<h2>Increases in 4 out of 5 categories<\/h2>\n<p>The report categorizes 33 attack types, of which the top five are: <a href=\"https:\/\/www.tripwire.com\/state-of-security\/security-awareness\/6-common-phishing-attacks-and-how-to-protect-against-them\/\" target=\"_blank\" rel=\"noopener noreferrer\">Phishing<\/a> (and its related attack styles of Smishing, Vishing, and Pharming), non-payment or non-delivery scams, extortion, personal data breach, and identity theft.\u00a0 It is also important to note that one complaint may contain more than one crime type.\u00a0 Four of the five categories showed a more than 10% increase from the last year.\u00a0 The only crime that was lower was \u201cpersonal data breach\u201d, which makes sense when compared to the most prevalent attack vector, Phishing.<\/p>\n<p>Phishing incidents doubled from 2018 and were 100 times higher than all previous years starting in 2016.\u00a0 It makes sense that, since so many people were working remotely, they all became highly susceptible to many phishing scams.<\/p>\n<p>The <a href=\"https:\/\/www.ic3.gov\/Home\/ComplaintChoice\" target=\"_blank\" rel=\"noopener noreferrer\">Internet Crime Complaint Center<\/a> (also known as IC3) makes it very easy for a person to report a cybercrime.\u00a0 In the case of fraudulent asset transfers, the Recovery Asset Team (RAT) successfully froze the accounts of the cybercriminals, returning the stolen funds to 82% of the 1,303 people who filed a complaint.\u00a0 This is an impressive number.\u00a0 In one particular case, a health care victim sent five wire transfers that totaled more than $2 million. The RAT Squad was able to collaborate with the financial institution where the transfers occurred, and successfully placed holds on the funds to allow the victim time for the indemnification process to proceed.\u00a0 Further to that, the information gained through that collaborative effort lead to another investigation that targeted the accounts of the money \u201cmules\u201d, potentially saving other victims.<\/p>\n<p>When it came to the biggest money-makers for cybercriminals, Business Email Compromise was the greatest revenue generator.\u00a0 This resulted in a staggering $1.8 billion windfall for the criminals.\u00a0 This is shocking, mostly because most organizations have security awareness training as part of the normal course of business.\u00a0 One interesting finding in the report is that investment scams cost victims a total of $369 Million. It will be fascinating to see how this metric changes in the 2021 report in light of the GameStop\/Reddit rally of early 2021. If opportunistic cybercriminals are undeterred by a global pandemic, it is safe to assume that some stock trading fraud is not beyond the ethical bounds of such an organization.<\/p>\n<h2>Opportunity to increase reporting<\/h2>\n<p>Given the success of the IC3 Teams and the ease of reporting, one can only wonder why any victim, particularly a business, would hesitate to report a cybercrime?\u00a0 One reason, of course, is that the IC3 is not very active on the advertising spectrum. Can you recall ever seeing a promotional piece for what to do if you are the victim of a crime?\u00a0 As an informal challenge, ask your friends, family, and colleagues if they know about the IC3.\u00a0 Many victims might call their local law enforcement agency, but the local police are usually ill-equipped to handle internet crime.\u00a0 As we have seen in the <a href=\"https:\/\/cisomag.eccouncil.org\/miami-beach-police-department-suffers-ransomware-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">past<\/a>, sometimes <a href=\"https:\/\/fox8.com\/news\/i-team\/westlake-police-department-hit-by-ransomware-that-made-some-evidence-disappear\/\" target=\"_blank\" rel=\"noopener noreferrer\">they<\/a> are <a href=\"https:\/\/www.msspalert.com\/cybersecurity-breaches-and-attacks\/ransomware\/maryland-salisbury-police-department-hacker-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">victimized<\/a> as well. One could posit that the FBI and the IC3 need to elevate their visibility in the mind of the public.<\/p>\n<h2>Staying Safe<\/h2>\n<p>It is awful to think of all that we have suffered in 2020.\u00a0 That becomes compounded by the fact that, even while sequestered in our homes in an effort to keep our colleagues safe, our businesses saw an increase in attacks.\u00a0 One way to help secure a business is by using the services of a company with experience and expertise.\u00a0 ITEGRITI offers a full range of <a href=\"https:\/\/itegriti.com\/kw022024\/services\/\">services<\/a> to keep your organization safe and prepared, including, attack surface reduction, business continuity planning, and testing, crisis communications, cyber and physical security convergence, incident response and recovery, and all other services to help your business avoid the perils of our hyper-connected world.<\/p>\n<p>To get started, take our free <a href=\"https:\/\/www.research.net\/r\/cyberriskbaseline\">Cyber Risk Assessment<\/a>.\u00a0 This tool can help you to see where you stand or <a href=\"https:\/\/itegriti.com\/kw022024\/contact\/\">contact us<\/a> to learn how we can help you achieve your security goals.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The latest FBI report on Internet Crime (IC3) categorizes 33 attack types. Four of the five categories showed a more than 10% increase from the last year. Take a look at the key findings.<\/p>\n","protected":false},"author":13,"featured_media":2699,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,2180],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Key Findings of FBI\u2019s 2020 Internet Crime Complaint Centre Report - kw022024<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Findings of FBI\u2019s 2020 Internet Crime Complaint Centre Report\" \/>\n<meta property=\"og:description\" content=\"The latest FBI report on Internet Crime (IC3) categorizes 33 attack types. Four of the five categories showed a more than 10% increase from the last year. Take a look at the key findings.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-05T14:04:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T04:49:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/04\/itegriti-phishing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Covello\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@BobCovello\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Covello\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/\"},\"author\":{\"name\":\"Bob Covello\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/21c4dc93eac8349704f909323a534978\"},\"headline\":\"Key Findings of FBI\u2019s 2020 Internet Crime Complaint Centre Report\",\"datePublished\":\"2021-04-05T14:04:31+00:00\",\"dateModified\":\"2021-04-12T04:49:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/\"},\"wordCount\":1053,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/04\/itegriti-phishing.jpg\",\"articleSection\":[\"Cybersecurity\",\"Managed Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/\",\"name\":\"Key Findings of FBI\u2019s 2020 Internet Crime Complaint Centre Report - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/04\/itegriti-phishing.jpg\",\"datePublished\":\"2021-04-05T14:04:31+00:00\",\"dateModified\":\"2021-04-12T04:49:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/04\/itegriti-phishing.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/04\/itegriti-phishing.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Key Findings of FBI\u2019s 2020 Internet Crime Complaint Centre Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/21c4dc93eac8349704f909323a534978\",\"name\":\"Bob Covello\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3f7818cc9c64f3243c8b9fea1bb82616?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3f7818cc9c64f3243c8b9fea1bb82616?s=96&d=mm&r=g\",\"caption\":\"Bob Covello\"},\"description\":\"Bob Covello (@BobCovello) is a 20-year technology veteran and InfoSec analyst with a passion for security topics. He is also a volunteer for various organizations focused on advocating for and advising others about staying safe and secure online. Author for Security and Technology sites, including: AT&amp;T Cybersecurity (formerly Alienvault), Tripwire, LawTechnology News, LegalTech, Graham Cluley's Security News, LivingSecurity, Venafi, InformationSecurity Buzz, InformationWeek, (ISC)2 \u2605 Security Strategy: Design and implement strategic cybersecurity solutions that strengthen security controls, remedy endpoint security vulnerabilities, and transform end-user behaviors for reduced risk exposure. \u2605 Presenter and Contributor to (ISC)2\u2019s Safe and Secure Online Program as part of isc2cares.org. Author for certification test-prep site. \u2605 Executive Training &amp; Consulting: Initiate and foster strong, lasting relationships with security industry experts as well as C-Suite business executives, including CIO, CTO, and CISO, to communicate cybersecurity trends and solutions. ---------------------------------- Qualifications &amp; Credentials ---------------------------------- \u2611 Over 20 Years of Technology Leadership &amp; IT Security Excellence \u2611 Early Career Experience in Physical Security with the Westchester County Department of Corrections \u2611 Understanding and Practical Application of Emerging Data Security Solutions &amp; Techniques \u2611 Uncovering &amp; Preventing Potential Security Vulnerabilities \u2611 Bachelor\u2019s Degree, Iona College \u2611 CISSP \u2013 Certified Information Systems Security Professional \u2611 CEH \u2013 Certified Ethical Hacker\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/bobcovello\/\",\"https:\/\/x.com\/BobCovello\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/bob-covello\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Key Findings of FBI\u2019s 2020 Internet Crime Complaint Centre Report - kw022024","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/","og_locale":"en_US","og_type":"article","og_title":"Key Findings of FBI\u2019s 2020 Internet Crime Complaint Centre Report","og_description":"The latest FBI report on Internet Crime (IC3) categorizes 33 attack types. Four of the five categories showed a more than 10% increase from the last year. Take a look at the key findings.","og_url":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2021-04-05T14:04:31+00:00","article_modified_time":"2021-04-12T04:49:12+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/04\/itegriti-phishing.jpg","type":"image\/jpeg"}],"author":"Bob Covello","twitter_card":"summary_large_image","twitter_creator":"@BobCovello","twitter_site":"@itegriti","twitter_misc":{"Written by":"Bob Covello","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/"},"author":{"name":"Bob Covello","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/21c4dc93eac8349704f909323a534978"},"headline":"Key Findings of FBI\u2019s 2020 Internet Crime Complaint Centre Report","datePublished":"2021-04-05T14:04:31+00:00","dateModified":"2021-04-12T04:49:12+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/"},"wordCount":1053,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/04\/itegriti-phishing.jpg","articleSection":["Cybersecurity","Managed Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/","url":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/","name":"Key Findings of FBI\u2019s 2020 Internet Crime Complaint Centre Report - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/04\/itegriti-phishing.jpg","datePublished":"2021-04-05T14:04:31+00:00","dateModified":"2021-04-12T04:49:12+00:00","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/04\/itegriti-phishing.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/04\/itegriti-phishing.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/key-findings-of-fbis-2020-internet-crime-complaint-centre-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Key Findings of FBI\u2019s 2020 Internet Crime Complaint Centre Report"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/21c4dc93eac8349704f909323a534978","name":"Bob Covello","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3f7818cc9c64f3243c8b9fea1bb82616?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3f7818cc9c64f3243c8b9fea1bb82616?s=96&d=mm&r=g","caption":"Bob Covello"},"description":"Bob Covello (@BobCovello) is a 20-year technology veteran and InfoSec analyst with a passion for security topics. He is also a volunteer for various organizations focused on advocating for and advising others about staying safe and secure online. Author for Security and Technology sites, including: AT&amp;T Cybersecurity (formerly Alienvault), Tripwire, LawTechnology News, LegalTech, Graham Cluley's Security News, LivingSecurity, Venafi, InformationSecurity Buzz, InformationWeek, (ISC)2 \u2605 Security Strategy: Design and implement strategic cybersecurity solutions that strengthen security controls, remedy endpoint security vulnerabilities, and transform end-user behaviors for reduced risk exposure. \u2605 Presenter and Contributor to (ISC)2\u2019s Safe and Secure Online Program as part of isc2cares.org. Author for certification test-prep site. \u2605 Executive Training &amp; Consulting: Initiate and foster strong, lasting relationships with security industry experts as well as C-Suite business executives, including CIO, CTO, and CISO, to communicate cybersecurity trends and solutions. ---------------------------------- Qualifications &amp; Credentials ---------------------------------- \u2611 Over 20 Years of Technology Leadership &amp; IT Security Excellence \u2611 Early Career Experience in Physical Security with the Westchester County Department of Corrections \u2611 Understanding and Practical Application of Emerging Data Security Solutions &amp; Techniques \u2611 Uncovering &amp; Preventing Potential Security Vulnerabilities \u2611 Bachelor\u2019s Degree, Iona College \u2611 CISSP \u2013 Certified Information Systems Security Professional \u2611 CEH \u2013 Certified Ethical Hacker","sameAs":["https:\/\/www.linkedin.com\/in\/bobcovello\/","https:\/\/x.com\/BobCovello"],"url":"https:\/\/itegriti.com\/kw022024\/author\/bob-covello\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2695"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=2695"}],"version-history":[{"count":3,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2695\/revisions"}],"predecessor-version":[{"id":2697,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2695\/revisions\/2697"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/2699"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=2695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=2695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=2695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}