“Everybody in this room is a target.” That was the word from FBI Special Agent Daniel R. Spicer Jr., a member of the FBI Omaha Cyber Task Force, who gave one of the presentations on Wednesday, Aug. 9, at the Cybersecurity Event At The Stardust event venue at 218 Iowa St., Davenport. That event, which […]
Already a subscriber? Log in
Want to Read More?
Get immediate, unlimited access to all subscriber content and much more.
Learn more in our subscriber FAQ.
- Unparalleled business coverage of the Iowa City / Cedar Rapids corridor.
- Immediate access to subscriber-only content on our website.
- 52 issues per year delivered digitally, in print or both.
- Support locally owned and operated journalism.
“Everybody in this room is a target.”
That was the word from FBI Special Agent Daniel R. Spicer Jr., a member of the FBI Omaha Cyber Task Force, who gave one of the presentations on Wednesday, Aug. 9, at the Cybersecurity Event At The Stardust event venue at 218 Iowa St., Davenport.
That event, which was presented by Twin State Technical Services and the Quad Cities Chamber of Commerce, gave the audience an overview of the cyber threats they face, steps that can be taken to prevent such attacks and state and federal laws in the works to battle cyber criminals.
Mr. Spicer told the crowd of about 50 people from the business community that in this computer era, “Every crime is going to have a cyber edge to it.”
And he outlined some of those cyber crimes that often center on criminals at a computer who steal the identity of a person or business and then steal money or property. Some of those crimes include:
- Phishing or smishing: The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to get people to reveal personal information, such as passwords and credit card numbers.
- Business email compromise (BEC): A cybercrime where the scammer uses email to trick someone into sending money or divulging confidential company information. The criminal often poses as a trusted figure, then asks for a fake bill to be paid or for sensitive data they can use in another scam.
- Ransomware attack: This is malware designed to deny a user or organization access to files on their computer. By encrypting these files and demanding a ransom payment for the decryption key, cyberattackers place organizations in a position where paying the ransom is the easiest and cheapest way to regain access to their files. Mr. Spicer told the crowd that some of the variants of these attacks have titles such as “Karakurt,” “Conti,” “Wasted” and “Maze.”
- Be very careful of your moves on social media. In fact, Mr. Spicer said “social media is cancer.”
- Have a response plan and make sure that business employees know what to do in case of suspected attacks.
- Report suspected cyberattacks to your bank or financial institution. The sooner you report such events, the more likely you can recover stolen money.
- Have a reliable backup of company information and files.
- Pay attention to email and other other communications in the company. “We can’t be shy. We have to pay attention. … Don’t click on something if you don’t know what it is,” said Iowa State Sen. Chris Cournoyer of LeClaire.
- Consumer data privacy (SF 262): The bill provides consumers with more control over their personal data.
- Sexual exploitation: (SF 84): The bill makes it a class C felony relating to offenses of sexual exploitation of a minor and stalking committed while using technology devices.
- Ransomware (HR 143): The bill provides a definition of “ransomware” and makes it a crime in Iowa.
- Cybersecurity programs (HF 553): This bill provides an incentive to businesses to safeguard personal information.