What is Cyber Crime?
Cybercrime refers to two related but distinct categories of illegal activity: cyber-dependent crimes, which rely entirely on technology (like hacking or malware attacks), and cyber-enabled crimes, where digital tools are used to amplify traditional offenses such as fraud or identity theft.
Cyber
Cyber-dependent crime involves offences that rely entirely on computers, networks, or digital systems. These crimes can’t happen without technology. Examples include hacking, launching malware, or disrupting online services.
DDOS ATTACKS
Cybercriminals can crash websites by flooding them with traffic from multiple sources—a tactic known as a Distributed Denial of Service (DDoS) attack. To do this, they build large networks of infected computers, called botnets, by secretly installing malware on users’ devices. Once the site is overwhelmed and offline, attackers may exploit vulnerabilities to break in and steal data.
PHISHING
Phishing is a type of online scam where criminals impersonate trusted sources—like banks or companies—to trick you into revealing personal or financial information through fake emails, texts, or websites.
RANSOMWARE
Ransomware is a type of malicious software that locks or encrypts your files, systems, or entire network, making them inaccessible. Criminals then demand a ransom—often in cryptocurrency—in exchange for a decryption key or promise to restore access. These attacks can target individuals, businesses, hospitals, or even government agencies.
SOCIAL ENGINEERING
Social engineering is a tactic used by criminals to manipulate people into giving away sensitive information. They often pose as trusted figures—like customer service reps or police officers—via phone or email to gain credibility. Their goal is to trick victims into revealing usernames, passwords, or personal data, which can then be sold or used to open fraudulent accounts.
These scams can also happen in person. Criminals may leave infected USB drives in public places or watch over someone’s shoulder as they enter login details. Staying alert and cautious is key to protecting your information.
You’re the First Line of Cyber Defence

Update Your Software
Whether it’s your phone, laptop, game console or even your smart fridge, regular software updates are essential. These updates fix security flaws that hackers could exploit, so staying current helps protect your devices and personal data from cyber threats.

Create Back-Ups
If you lose access to your files due to a cyberattack, having a backup means you’re not at the mercy of criminals. You can safely wipe your device and restore everything from your backup—no ransom, no panic.

Think Before You Click
Many scams begin with fake emails or texts designed to trick you into clicking a link and sharing your bank details.
Legitimate banks and financial institutions will never ask you to confirm sensitive information this way. Even if the message looks real, don’t trust it. If you're unsure, contact your bank directly using a verified phone number from an official letter, their website (typed manually into your browser), or a trusted source like the phone book.

Check Your Digital Footprint
Weak privacy settings make it easy for cybercriminals to collect personal info, impersonate you, or manipulate you through fake profiles. Keep your accounts private and visible only to trusted contacts to stay safe online.

Use Three Random Words
Use a different password for every account and store them securely in your browser or a password manager. Build passwords using three random words—like shared-yellow-pizza—and strengthen them with numbers or symbols, such as 2sharedyellowpizza!!

Turn on 2-Step Verification for your email
2-Step Verification (2SV) gives you twice the protection so even if cyber criminals have your password, they can't access your email. 2SV works by asking for more information to prove your identity. For example, getting a code sent to your phone when you sign in using a new device or change settings such as your password.
CYBER PROJECTS

Young Cyber Security Ambassadors
The young cyber security ambassador (YCSA) programme is an educational volunteering programme to inform young people aged 12-17 years around cyber security and positive online behaviours.

Cyber Switch Up
Cyber Switch Up is a digital & cyber skills competition aimed at students aged 11-18 years in Key Stages 3, 4 and 5. Open to students in all secondary schools and colleges across the Yorkshire & the Humber region. Free to participate Online qualifier, which can be completed in school or at home.

Cyber Blue Line
Cyber Switch Up is a digital & cyber skills competition aimed at students aged 11-18 years in Key Stages 3, 4 and 5. Open to students in all secondary schools and colleges across the Yorkshire & the Humber region. Free to participate Online qualifier, which can be completed in school or at home.

Cyber Spotlight VR
The cyber spotlight virtual reality (VR) programme is aimed to enhance understanding of cybercrime prevention through a series of learning environments.