top of page
  • greenealdridge

Using Competitive Intelligence to Combat Cybercrime

Updated: Dec 10, 2021

Competitive intelligence by design can be used to win against any and all obstacles.

What can members do?

One of today’s biggest obstacles is the evolution and constant threat of Cybercrime, including ransomware extortion or business email compromise, resulting in significant financial loss, reputational damage, and regulatory non-compliance.

Ransomware is a form of malware designed to encrypt files on a device rendering them inaccessible. The attacker then demands ransom in exchange for the decryption key. This act is a form of extortion - crime involving coercion to obtain money. To learn more about ransomware visit

Business email compromise (better known as BEC) exploits the trust we have in our email systems to conduct business—both personal and professional. In a BEC scam, criminals send an email message that appears to come from a known source making a legitimate request including request for payment or information often resulting in the loss of thousands even hundreds of thousands of dollars. To learn more about BEC visit

The most frightening aspects of cybercrime campaigns are ease of execution and incredibly high success rate. Tactics include a physical visit to your workspace, mundane phishing, or phone spoofing. If we are unprepared for these events, we are inadvertently welcoming an adversary into our environment and are (sometimes literally) unwittingly opening the door to financial, compliance and reputational damage.

Understanding your adversaries is the key to protecting your organization.

GreenRidgeCI offers a variety of solutions including cyber competitive intelligence, cybercrime simulations, and organizational briefings. Our goal is to strengthen your security posture to beat the cybercriminals.

Another way that GreenRidgeCI does Competitive Intelligence differently.

31 views0 comments

Recent Posts

See All


bottom of page