Midlands Fraud Forum

Member Login Member Area


2019 Publications

A collection of useful documents from various sources around the internet.

Search articles by keyword

<< First  < Prev   1   2   Next >  Last >> 
  • 16 Jun 2019 10:45 PM | Jo Buckley (Administrator)

    Understanding the gap in perceptions of cybersecurity between consumers and the organizations that serve them is a key theme of this report. KPMG believe that solving this gap

    in perceptions generates consumer trust and confidence propels business growth.

    Cybercriminals are looking for the biggest bang for the buck. As they seek to maximize their return on investment, they focus on what makes them the most money — and at the moment that is tricking firms into transferring funds through spear phishing and social engineering (so-called CEO frauds), extortion through ransomware, and attacks on the new world of cryptocurrencies.

    Open publication

  • 08 May 2019 10:15 PM | Jo Buckley (Administrator)


    This report, for the first time, establishes a baseline figure for the cost of recruitment fraud. It also shows, where it is allowed to occur as a result of no or inadequate pre-employment checks, it often leads to further fraud and theft. Fraudsters, encouraged by successfully

    gaining employment through dishonesty are often motivated to attempt wider fraud within their host organisations. However, the deterrent to individuals from carrying out recruitment fraud is not complex or difficult for businesses to adopt. Effective pre-employment checks are relatively low cost and easy to commission. With fraud growing by almost 50% in the last 10 years, the real question is not why would we do this, but why wouldn’t we?

    Open publication


  • 22 Apr 2019 8:21 PM | Jo Buckley (Administrator)

    The National Crime Agency’s mission to lead the UK’s fight to cut serious and organised crime is critical to our national security. This Annual Plan sets out how we will develop the Agency and lead the whole system, harnessing the collective powers of law enforcement, government, the voluntary sector and industry to deliver the coordinated response we need to protect our communities and counter the escalating and rapidly evolving threat from Serious and Organised Crime (SOC).

    Open publication

  • 22 Apr 2019 8:20 PM | Jo Buckley (Administrator)

    Whilst 72% of companies now consider cyber a high or very high risk, less than half, only 46%, have a dedicated cyber security budget. Worldwide, we continue to see harmful cyber-attacks and significant data breaches at major, household name companies. Many large firms are now investing heavily in cyber security, but attacks over the past year continue to demonstrate the importance of comprehensive cyber risk management strategies. Some common themes continue to be apparent in some of the largest cyber-attacks, such as the failure to have a comprehensive understanding of business assets across multiple locations, or not understanding the importance of the supply chain to the overall security of the business

    Open publication

  • 22 Apr 2019 8:18 PM | Jo Buckley (Administrator)

    The first attempt to put the common law offence of bribery on a statutory basis was in 1889. For many decades there has been agreement that the law was unclear and unsatisfactory, especially as regards offences committed by corporations, but there was agreement on little else. Eventually the Bribery Act 2010 was passed to put the offences on a fresh statutory basis. It has now been in force nearly eight years, and a House of Lords Select Committee has been conducting post legislative scrutiny to see whether the Act is achieving its intended purposes.

    Open publication

  • 22 Apr 2019 8:15 PM | Jo Buckley (Administrator)

    This edition of UK Justice Policy Review covers a year, in which there were many opportunities for reflection on current criminal justice performance and priorities, but minds began to become preoccupied with the increasingly imminent prospect of the UK leaving the EU in 2019. While violence on the streets was perceived to be a rising threat, online fraud, child sexual abuse, and the protection of the vulnerable were coming to be regarded as problems to which the police appeared unable to respond adequately. Fraud, Bribery and Money Laundering sentences, the subject of an assessment published in June 2018, found no evidence that the guidelines had increased in severity, though it noted an increase in severity in relation to some benefit fraud offences, which ‘may have been related to the guideline’.

     Open publication


  • 14 Apr 2019 10:36 PM | Jo Buckley (Administrator)


    How smart analytics can stop procurement fraud

    Procurement fraud can emerge in any organisation that fails to acknowledge and address it. This is why procurement and other forms of internal fraud are such a menace. Many organisations are in denial over the scale of internal fraud, leading to belated investigations that fail to uncover its true extent. While fraud is primarily an external threat, half of all cases are assisted by employees. It is time for businesses to unmask the enemy within.

    Open publication


  • 09 Apr 2019 9:32 AM | Jo Buckley (Administrator)

    The Cyber Security Breaches Survey is a quantitative and qualitative survey of UK businesses and charities. For this latest release, the quantitative survey was carried out in winter 2018 and the qualitative element in early 2019. It helps these organisations to understand the nature and significance of the cyber security threats they face, and what others are doing to stay secure. It also supports the Government to shape future policy in this area.

    Open publication

  • 09 Apr 2019 9:30 AM | Jo Buckley (Administrator)

    The HMICFRS conclude the law enforcement response to fraud is disjointed and ineffective with no national strategy for tackling fraud. Police forces have therefore developed a range of different responses. We found some examples of good practice but, taken as a whole and given the scale of fraud, not enough is being done. When it exists, good practice is not always disseminated or widely adopted.

    Open publication

     


  • 08 Apr 2019 3:54 PM | Jo Buckley (Administrator)

    This report, which was sponsored by Tenable and conducted by Ponemon Institute, reveals that a lack of visibility into the attack surface, inadequate security staffing and reliance on manual processes undermine operational technology (OT) sector organizations’ stated requirements to protect OT and IoT infrastructure from downtime. The report said 37% reported a “significant disruption” to business processes caused by malware, 33% reported a cyber-attack caused “significant downtime”, 23% reported that they had been hit by nation state attacks and 60% said disruptive cyber-attacks are among the threats they are most worried about.

    Open publication

<< First  < Prev   1   2   Next >  Last >> 


Join the Network

Attend our conferences, master classes and events share knowledge and
best practices

Mailing List Signup

Non-members can find out about upcoming events
and masterclasses by
signing up here.

twitter   linkedin

Midlands Fraud Forum Ltd. Reg.No: 06436330
Copyright © March 2014
Disclaimer & Privacy Policy

Powered by Wild Apricot Membership Software