Pritesh Ganatra

British Technology Solutions

Your technology problem solver ...

Thanks to cybercrime, do we need a new internet?

Pritesh Ganatra

CREATED BY PRITESH GANATRA

Published: 09/12/2025 @ 09:00AM
#CyberCrime #CyberSecurity #OnlineSafety #DataProtection #DigitalResilience #TechPolicy

I wonder whether the rise in cybercrime means scrapping the Internet entirely or rebuilding trust with smarter design. We need accountable platforms, stronger standards and better habits. Let's make the net safer without losing its soul ...

Cybercrime rampant, Invisible thieves lurking, Devouring data

Cybercrime rampant, Invisible thieves lurking, Devouring data

I've been asking myself whether we've let the internet drift so far that cybercrime now sets the rules. I see friends' parents fooled by slick scams, fake investment gurus promising easy wins, and deepfakes muddying the truth until we doubt our eyes.

It's tempting to hit 'delete all' and start again!

I think a better question is how we can rebuild trust through design, incentives and accountability. We can keep the good, reduce the harm, and make online safety normal rather than a specialist skill.

I don't believe people are suddenly careless; the systems are optimised to exploit human attention and emotion. When trust signals - blue ticks, follower counts, glossy adverts - can be rented or forged, even sharp minds get caught.

Good cybersecurity shouldn't ask everyone to become a cryptographer. It should minimise the need for heroics by making the safe path the easy path, and the risky path visibly inconvenient.

I'd start with proof, not vibes. Platforms should adopt built‑in provenance for media so you can see if an image, video or voice clip was captured on a device, edited, or AI‑generated, and by whom. That gives citizens a context layer to evaluate claims before they spread. Pair that with clear data protection defaults and rapid takedown of impersonation and payment fraud, and you measurably cut the oxygen to the grifters.

Payment gateways, ad networks and app stores must
stop being neutral conduits for scams!

If a platform consistently allows fraud to pay for reach, regulators should be able to levy fines proportionate to the harm and force restitution. Aligning incentives beats pleading for better behaviour. The entities profiting from the attention economy should bear the cost of cleaning their gutters.

We also need identity without mass surveillance. Verifiable credentials can prove I'm over 18, a UK resident, or the genuine owner of an account, without handing my entire passport to every website. That reduces social engineering and makes coordinated cyber attacks less trivial, while preserving privacy. The technology exists; the missing piece is consistent standards and cross‑platform adoption.

Education remains essential, but it must be practical, not preachy. Teach people to verify payment requests through 2FA, to freeze and reissue cards quickly, to use password managers and passkeys, and to check domain names before transferring money. These habits form the bedrock of digital resilience, but they only scale if the tools are simple, free and pushed by default across devices and services.

The government has a role beyond slogans!

Mandate secure‑by‑default configurations, require rapid incident reporting for large platforms, and enforce transparent risk assessments for new features that affect online safety. If a feature increases the likelihood of exploitation, ship it with guardrails or don't ship it at all. Safety should be a product requirement, not a retrospective apology.

So do we need a new internet? Maybe not a replacement, but a renovation with stricter building codes. Stronger authentication, end‑to‑end encryption with recoverable account access, content provenance, and auditable algorithms can harden the structure without erasing openness.

We should expect platforms to fund victim support and cooperate on cross‑border takedowns, because cybercrime thrives on jurisdictional gaps and delay.

We should normalise pausing before sharing, treating extraordinary claims like street magic, which is entertaining until verified. We should celebrate companies that choose friction for safety, such as cooldowns on large transfers or prominent warnings around high‑risk content. A little friction can prevent a lot of grief, and signal whose side the platform is on.

In the end, I don't want a sterilised web, just one where trust is earned and checked, and where the cost of harm is borne by those who enable it.If we align incentives, upgrade the plumbing and keep humans in the loop with clearer signals, we won't need a torch‑and‑pitchfork reboot.

We'll have an internet that shrugs off cybercrime rather than succumbing to it

Until next time ...

PRITESH GANATRA

Your technology problem solver

Would you like to know more?

If anything I've written in this blog post resonates with you and you'd like to discover more of my thoughts about cybercrime and how we can protect ourselves and our loved ones, it may be a great idea to give me a call on 01604 926100 or take a look at my website by clicking here.

Share the blog love ...

Share this to FacebookBuffer
Share this to FacebookFacebook
Share this to TwitterTwitter
Share this to Linkedin (popup window)Linkedin
Share this to Pinterest (popup window)Pinterest
Share this to WhatsApp (popup window)WhatsApp

#CyberCrime #CyberSecurity #OnlineSafety #DataProtection #DigitalResilience #TechPolicy

About Pritesh Ganatra ...

Pritesh Ganatra 

The word 'Technology' has too many connotations in today's world! Where do we start? Simple terms like 'IT' and 'Telecoms'? or terms that appear NOT to have an actual meaning at all!, e.g. 'Internet of Things (IoT). Technology also encompasses specialist products and services like 'Rugged' and 'Tough' android devices, Lone Worker Software, panic alarm devices, smart energy devices, low energy lighting, credit card terminal (PCI DSS) security, indoor/ outdoor Wi-Fi systems, Ultrafast Gigabit internet connectivity, access control systems, industrial IoT circuit controllers.

BTS UK can consult from simple solutions to the most complex, provide some of the products through a wholesale channel, bring together a multi-disciplined 'Task Force' to deliver and implement complete Technology 'projects'.

I am your technology problem solver and I look forward to helping you.

More blog posts for you to enjoy ...

Click here to view this blog post


What's Your Back Up Strategy?

Here is the irony of the situation. It was inevitable that it would happen one day; that I would be caught out on the very thing I always preach to my clients. In two words: data backup ......

Click here to view this blog post


AI vs human writing: which one is best?

Last week's blog post was an experiment to see how well Artificial Intelligence systems (such as Chat GPT/Grammarly/Google Gemini, etc) actually write one of my blog posts, compared to me using my fifty-three years' worth of ...

Click here to view this blog post


Fraud, Fraud, Fraud! What's The Cost To Your Business?

Did you know that small and medium-sized enterprises (SMEs) account for 99.9% of the businesses in the UK? At the start of 2023, there were estimated to be 5.6 million private-sector businesses ......

Click here to view this blog post


Why you should only use AI as a research tool, not the final word

Use AI as a research tool to spark ideas and speed up reading. Then verify, compare sources, and keep judgment yours. It's guidance, not gospel ......

Click here to view this blog post


What is Email Security, And Why Do You Need To Be Really Careful About It?

Did you know that emails can be intercepted and the contents manipulated, modified and forwarded back to the intended recipient without you even knowing about it? Sounds frightening, doesn't it?...

Click here to view this blog post


Europe plans to ditch US tech giants for open-source resilience

Europe plans to ditch US tech giants and shift to open source for resilient, sovereign infrastructure. It's about trust, control and data privacy, not isolation. The move blends openness with European values and practical tec...

Click here to view this blog post


The Essential Role of Two Factor Authentication in Preventing Hacking Attacks

In our digital age, safeguarding personal information is crucial. Two Factor Authentication (2FA) stands out as a vital security measure, offering a robust layer of protection against hacking. By requiring an additional piece...

Click here to view this blog post


Datacentres Demand Power and Water: How Will AI Affect Our Resources?

As the ascent of datacentres keeps accelerating, driven by advancements in generative AI and quantum processors, the demands for electricity and water are growing alarmingly. This surge not only strains resources, but also ha...

Other bloggers you may like ...

Click here to view this blog post


Scaling Without Silos: Why Accountability Must Cross Department Lines

Posted by Steph Birch on https://blog.birchstrategicservices.com

To achieve scalability, any business must ensure that accountability goes beyond department lines. Siloed thinking can hinder communication and collab ...

Click here to view this blog post


Building a chatbot in under 10 minutes. Yes, really!

Posted by Steffi Lewis on https://www.yourbot.uk

If you've ever tried to set up a chatbot before, you've probably ended up lost in a maze of dashboards, API keys, token formulas, and existential desp ...

Click here to view this blog post


Why your employees' home Wi-Fi is your biggest business risk

Posted by Andrew Parker on https://blog.wolvertonsolutions.com

Let's talk about home Wi-Fi and why it matters to business security. With so many employees working from home, it's become a real risk, but manageable ...

Click here to view this blog post


Business Coaches: Blogging is Your Ultimate Marketing Secret

Posted by Steffi Lewis on https://www.sblogit.com

Unlock your potential with blogging for business coaches, an invaluable tool for sharing expertise while connecting with your audience. Embrace the un ...