Europe adopts new cyber crime agenda

Powered by SC Magazine
 

The European Union has adopted the European Commission's strategy on cyber crime, and called for better co-operation between businesses and the police.

Over the next five years the EC strategy will introduce steps for closer co-operation and information exchange between law enforcement authorities and the private sector.

This will feature an early alert system that includes a platform where online crimes affecting businesses can be reported, shared and cross-checked by Europol. A budget of €300,000 has been allocated to create the platform in the short term.

"The strategy encourages the much needed operational co-operation and information exchange between the member states," said EU vice president Jacques Barrot, announcing the move.

"It gives a shared responsibility to the Commission, the member states and other stakeholders to introduce the different measures. If the strategy is to make the fight against cyber crime more efficient, all stakeholders have to be fully committed to its implementation. We are ready to support them, also financially, in their efforts."

These efforts will include internet investigation teams, cyber patrols, joint investigation teams and remote searches.

"Cyber crime is a growing threat to our societies today," said the EU. " Member states suffer thousands of attacks a day against their information systems. Viruses stealing information from personal computers, spam, identity theft and child pornography are increasingly widespread."

Copyright ©v3.co.uk


Europe adopts new cyber crime agenda
 
 
 
Top Stories
Feeling Shellshocked?
Stay up to date with patching for the Bash bug.
 
Amazon forced to reboot EC2 to patch Xen bug
Rolling restarts over next week.
 
Vodafone reveals plans to store users' online activity
Says retrieval under Govt proposal will impose massive cost.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1355

Vote