- Budgeting, Planning & Forecasting
- Enterprise Accounting Software
- Financial Management Solutions
- Small and Medium Sized Business Accounting Software
- Treasury, Cash and Risk Management
- Business Activity Monitoring (BAM)
- Business Intelligence Software
- Business Process Management (BPM)
- Enterprise Performance Management
- Reporting and End-User Query Tools
- RFID-- Radio Frequency Identification
- Warehouse Management Software
- Customer Experience Management (CEM)
- Customer Information Management
- Sales and Marketing Software
- Enterprise Asset Management (EAM)
- Facilities Management and Maintenance
- Electronic Medical Billing Systems
- Healthcare Inventory Management
- Employee Benefits Administration
- Employee Relationship Management (ERM)
- Learning Management Systems (LMS)
- Workforce Planning and Management
- Human Resources and Payroll Software
- Enterprise Content Management
- Information Lifecycle Management
- Advanced Planning and Scheduling
- Manufacturing Enterprise Resource Planning (MERP)
- Integrated Manufacturing Solutions
- Product Life Cycle Management (PLM)
- Project Management Solutions
- Resource Planning and Scheduling
- Web, Video and Audio Conferencing
- Database Planning and Implementation
- Cloud Computing Applications
- Enterprise Application Integration
- Enterprise Application Integration Middleware
- Service Oriented Architecture (SOA)
- Business Service Management (BSM)
- Business Technology Optimization
- Enterprise Architecture Management (EAM)
- Enterprise Resource Management
- Enterprise Resource Planning (ERP)
- Information Technology Infrastructure Library (ITIL)
- IT Service Management (ITSM)
- Project Portfolio Management (PPM)
- Technology Planning and Analysis
- BYOD (Bring Your Own Device)
- Managed Service Provider (MSP)
- Network Configuration Management Software
- Fraud Detection & Prevention
- Intrusion Detection and Prevention
- IT Security Frameworks and Standards
- Threat and Vulnerability Management
- Virtual Private Network Security
- Data Center & Storage Solutions
- Network Attached Storage (NAS)
- Remote and Offsite Data Storage
- SAN Virtualization and Consolidation
- Application Lifecycle Management (ALM)
- Application Performance Management (APM)
- Enterprise Systems Management
- Systems Modeling and Analysis
- Performance Monitoring Tools
- Software Configuration Management (SCM)
- Software as a Service (SaaS)
- Web Applications Architecture
- Wireless Application Development
- Electronic Catalog Management
- Electronic Commerce Interchange (EDI-XML)
- Data Center Power Management
- Software-Defined Data Center (SDDC)
Posted by Dan Swinhoe
How much does the average hacker earn, and what do they spend their illicit gains on? According to a new study, not a whole lot, but the ones who do earn a lot live like Tony Montana.
Last year a report from Palo Alto and the Ponemon Institute found the annual salary of a hacker is just $28,744, well below the average pay for a tech worker (the majority of whom usually feel underpaid anyway).
A new study from cybersecurity firm Recorded Future detailed the profile of an average cybercriminal and how cybercrime gangs are structured. It found the average wage for a hacker is between $1,000 and $3,000 a month – largely in line with Palo Alto’s findings - and found that many are professionals with no criminals records or ties to traditional organized crime, and usually have steady day jobs with the occasional hacking job on the side.
Organized cybercrime gangs, however, operate with a strict hierarchy, featuring highly skilled members often set with a very narrow set of responsibilities. A single boss runs the organisations – often having a network of contacts that allow them to launder money and avoid the attention of law enforcement.
“Cyber-criminal syndicates don’t regard themselves as ordinary street criminals and rarely cross paths with everyday gangsters,” said report author Andrei Barysevich, “preferring to remain in the shadows and avoid unnecessary attention from both law enforcement and local mafia branches.”
The report details an almost Mafia-like structure, including legitimate business fronts for their operations:
“Team members tend to have strong ties in real life and often are respected members of their communities, viewed by many as successful businessmen and entrepreneurs. The group will often have a diversified investment portfolio and maintain a presence in real estate, hospitality, and auto-related businesses.”
Recorded Future found around 20% of criminals earn more than $20,000, with Barysevich saying that some were earning up to $200,000 a month of “pure profit.”
“This is what they can spend on loose women, fast cars, and nice clothes.”
Also read:
InfoShot: Hacking doesn’t pay
InfoShot: Tech companies rule high-paying US companies
InfoShot: Tech CEO pay vs. workers
PREVIOUS ARTICLE
«Can tech solve South Africa’s higher education crisis?NEXT ARTICLE
No ARM in a bit of server market competition»Dan is Senior Staff Writer at IDG Connect. Writes about all manner of tech from driverless cars, AI, and Green IT to Cloudy stuff, security, and IoT. Dislikes autoplay ads/videos and garbage written about 'milliennials'.
Phil Muncaster reports on China and beyond
wishful thinking, I guess
great article. as a CIO with over 20 years experience, best test any CIO can do before transitioning to another job, take a vacation for two...
Salah Shakir on Handling the transitional period when leaving your job as a CIO
It's been a joy, honor and adventure supporting David over the last few decades. Vision - creativity - work ethic - integrity - and perspective......
Technology changes every day... no, every second. So, I respect those companies which could survive among the other.
Anna Evans on From the 1800s to today: The world’s oldest technology companies
I agree with the every word! Machine learning have already changed our world!
Anna Evans on Human security teams can’t manage the new threat landscape alone
Insightful read on cyber security in the IoT space...
Wings2i on Cyber security: Is the honeymoon period over for the IoT?
IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.
Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.
Should the government regulate Artificial Intelligence?
Comments