Download and share these resources for fraud prevention and awareness

  • 10 Nov 2016 10:42 PM | David Clark (Administrator)

    Online shopping can save you considerable time, effort and money...There are however, some risks associated with shopping online. Following just a few simple steps can make online shopping much safer

    Download the infographic

  • 27 Oct 2016 5:56 PM | David Clark (Administrator)

    Not using anti-virus software, or not updating your anti-virus when prompted, will leave your devices more vulnerable to malware

    Download the infographic

  • 21 Oct 2016 7:19 PM | David Clark (Administrator)

    The infographic summarises the security controls you can apply to reduce your organisation’s exposure to a successful cyber attack.

    Download the infographic

  • 07 Oct 2016 7:13 PM | David Clark (Administrator)

    Whilst marketed to the public as investments Binary Options are essentially bets on whether certain prices within financial markets will rise or fall.

    There are only two options with this type of investment, "cash or nothing" : guess correctly and win, or guess incorrectly and lose all the money you invested.

     Binary Options are not regulated as an investment in the UK at present, which might be one of the reasons why criminals are increasingly using the guise of Binary Option Traders to defraud people. These fraudsters often use social networking sites and apps to lure potential victims with the promise of guaranteed returns on their investments.

    Download the infographic

  • 29 Sep 2016 8:19 PM | David Clark (Administrator)

    The senders name on an SMS can be spoofed, so even if the SMS appears to be from your bank, but the message is unexpected or unusual, then contact them directly via the phone number on the back of your card, or a bank statement.

    Download the infographic

  • 09 Sep 2016 7:35 PM | David Clark (Administrator)

    Ransomware is a form of malicious software [malware] that enables cyber criminals to remotely lock down files on your computer or mobile device. 

    Criminals will use ransomware to extort money from you [a ransom], before they restore your access to the files. 

    There are many ways that ransomware can infect your device, whether is be a link to a malicious website in an unsolicited email, or through a security vulnerability in a piece of software you use.

    Download the infographic

  • 18 Aug 2016 4:54 PM | David Clark (Administrator)

    Part of the “Do you really know...?” fraud series (Businesses Edition), from the Economic and Cyber Crime Prevention Centre

    Every company, irrespective of its size of the sector it operates in, is a target for fraudsters. Unfortunately, that threat sometimes comes in the form of employees from within your organisation. 

    Insider fraud occurs when someone uses their position within an organisation to steal money or information. Whether it is the theft of confidential business documents, fraudulently increasing purchasing order values, or intentionally over-claiming on expenses, these are all types of insider fraud. 

    As well as the financial losses, the damage to your company's reputation and the loss of trust from customers can be devastating.

    Download the infographic

  • 05 Aug 2016 9:46 PM | David Clark (Administrator)

    Job fraud occurs when fraudsters purport to be an employer and offer jobs that don't exist.

    These fake jobs are often advertised in the same places where legitimate companies advertise real jobs.

    The fraudsters rely on tactics like this to trick people into believing the jobs are genuine.

    Download the infographic

  • 03 Aug 2016 3:21 PM | David Clark (Administrator)

    From bogus ‘Computer Software Tech Support’ phone calls, e.g. someone from Microsoft or Apple contacting you and telling you there is a problem with your device, to fraudsters asking for credit card information to ‘validate your software’, e.g. validate your windows software, there are a number of computer software service scams you need to look out for.

    Fraudsters often use the names of well-known companies to commit their crime, as it makes their communication with you seem more legitimate. This is why it’s important to think twice before giving out any personal information.

    Download the infographic

  • 22 Jun 2016 11:04 AM | David Clark (Administrator)

    Distributed Denial of Service (DDoS)

    A DDoS attack is an attempt to make an online service unavailable by overwhelming it with a large volume of traffic from multiple sources. 

    Consider the likelihood and risks to your organisation of a DDoS attack, and put appropriate threat reduction/mitigation measures in place.

    Download the infographic

Join the Network

Attend our conferences, master classes and events share knowledge and
best practices

Mailing List Signup

Non-members can find out about upcoming events
and masterclasses by
signing up here.

twitter   linkedin

Midlands Fraud Forum Ltd. Reg.No: 06436330
Copyright © March 2014
Disclaimer & Privacy Policy

Powered by Wild Apricot Membership Software