Midlands Fraud Forum

Member Login Member Area

2018 Publications

A collection of useful documents from various sources around the internet.

Search articles by keyword

  • 18 Apr 2018 9:12 AM | Jo Buckley (Administrator)

    Among the various kinds of fraud that organizations might be faced with, occupational fraud is likely the largest and most prevalent threat. Occupational fraud, fraud committed against the organization by its own officers, directors, or employees,  constitutes an attack against the organization from within, by the very people who were entrusted to protect its assets and resources. This study contains an analysis of 2,690 cases of occupational fraud that were investigated between January 2016 and October 2017. Readers will find a wealth of information about the methods, causes, costs, and indicators of occupational fraud, as well as important information on how to prevent and detect it.

    Open publication

  • 15 Apr 2018 7:41 PM | Jo Buckley (Administrator)

    2017 will be remembered as the year of ransomware attacks and massive data breaches, supply chain threats and fake news stories. With attackers able to achieve many of their aims by using techniques not particularly advanced, the distinction between nation states and cyber criminals has blurred, making attribution all the more difficult. Cyber-attacks have resulted in financial losses to businesses of all sizes. The costs arise from the attack itself, the remediation and repairing reputational damage by regaining public trust.

    Open publication

  • 10 Apr 2018 4:32 PM | Jo Buckley (Administrator)

    The 108-page report includes a plethora of actionable data collected through global threat intelligence, advanced research and real-world breach investigations. The report includes compelling information, including major developments of the past decade in cybercrime and security, with an eye on preparing you for the future, the top methods used to compromise corporate networks, point-of-sale-systems and e-commerce sites and details on the evolution of exploit kits and other threats, including ransomware and cryptocurrency mining.

    Open publication

  • 05 Apr 2018 5:27 PM | Jo Buckley (Administrator)

    Many of the services provided by the force to vulnerable people are good, but HMICFRS most recent inspection found WMP failing to protect some victims adequately. Staff are generally good at identifying vulnerable people when they first contact the police, but at the time the inspection there were often not enough officers available to respond to incidents quickly when required. This means that victims, including some who are vulnerable, do not always receive the response they need, and may be put in danger as a result.

    Open publication

  • 25 Mar 2018 7:17 PM | Jo Buckley (Administrator)

    Email fraud, also known as business email compromise (BEC), is one of today’s greatest cyber threats. These socially engineered attacks seek to exploit people rather than technology. They are highly targeted, don’t include attachments or URLs, arrive in low volumes, and impersonate people in authority. These and other factors make email fraud difficult to detect and stop with traditional security tools. Email fraud, which spans a range of attacks and techniques, was rife in 2017.

    Open publication

  • 25 Mar 2018 7:14 PM | Jo Buckley (Administrator)

    Building a fraud-resilient charity is a job for everyone, everywhere, and at every level. All trustees and managers should have the knowledge and skills to recognise the tell-tale signs of fraud and then shape an effective and proportionate response. This guide is for trustees and senior managers of charities in England and Wales as well as their professional advisers. It summarises the main lessons and messages from the second national charity fraud conference and second national charity fraud awareness week. It also provides pointers to additional expert sources of information, support and best practice.

    Open publication

  • 01 Mar 2018 9:11 AM | Jo Buckley (Administrator)

    Last year, we saw how big-name enterprises were victimized by different forms of cybercrime, with huge amounts of money and information lost in the process. This roundup reviews the major cybersecurity stories and trends that surfaced in 2017. Ultimately, it aims to further highlight the importance of adopting smart security strategies for enterprises to be protected against risks and attacks from across the entire threat landscape.

    Open publication

  • 25 Feb 2018 10:51 PM | Jo Buckley (Administrator)

    The findings from this year’s GECS confirm that the long-term global trend towards higher levels of fraud is continuing, and clearly show the destructive impact that this rising tide of economic crime is having on businesses. Experience shows that times of uncertainty often create new openings for fraudsters to exploit gaps or weaknesses in controls, and it’s significant that over a quarter of respondents to our survey felt that the current geopolitical climate would lead to more opportunities for people to commit fraud. As such findings underline, it’s now more crucial than ever that businesses understand the fraud risk landscape and all the possible avenues of attack.

    Open publication

  • 18 Feb 2018 6:29 PM | Jo Buckley (Administrator)

    A broken link involving just one of your suppliers can send security concerns down your entire chain. The purpose of this whitepaper is to understand and reveal more about the relationship between organisations and third-party suppliers when it comes to cybersecurity. It also looks at data breach risk and response, and the impact on and views of consumers.

  • 11 Feb 2018 4:48 PM | Jo Buckley (Administrator)

    Phishing describes a type of social engineering where attackers influence users to do 'the wrong thing', such as disclosing information or clicking a bad link. Phishing can be conducted via a text message, social media, or by phone, but these days most people use the term 'phishing' to describe attacks that arrive by email. ‘Phishing Attacks: Defending Your Organisation’ contains advice on how organisations can defend themselves against malicious emails that use social engineering techniques.

    Open publication

Join the Network

Attend our conferences, master classes and events share knowledge and
best practices

Mailing List Signup

Non-members can find out about upcoming events
and masterclasses by
signing up here.

twitter   linkedin

Midlands Fraud Forum Ltd. Reg.No: 06436330
Copyright © March 2014
Disclaimer & Privacy Policy

Powered by Wild Apricot Membership Software