2017 Publications

A collection of useful documents from various sources around the internet.

Search articles by keyword

  • 10 Sep 2017 6:37 PM | Anonymous member (Administrator)

    Food fraud could be losing the food and drink industry up to £12bn annually, warranting substantial attention from industry, the bodies that protect it and the Government to help stamp it out at its core. Shoppers though, are increasingly savvy and aware of food fraud in its many guises, and confidence is declining. Consumers have a high level of perception that fraudulent activity takes place, influencing them to pursue food they can trust. Businesses that are able to adapt and appeal to consumer demands for transparency may therefore be recognised for it, achieving competitive advantage in a tough era for the food market.

    Open publication

  • 29 Aug 2017 10:08 PM | Anonymous member (Administrator)

    This report examines the nature and scale of online fraud, how the Home Office (the Department) and others have responded to the threat, and opportunities for the Department and others to tackle online fraud more effectively. Growth in the use of the internet and advances in digital technologies mean that citizens and businesses can now do more online. For the UK, this means there are opportunities for greater innovation and economic growth, but also more opportunities for online crime. While traditional crimes such as vehicle offences and house burglary have declined substantially in recent years, fraud, more than half of which is committed online, is becoming more common and is a growing threat.

    Open publication

  • 19 Aug 2017 11:46 AM | Anonymous member (Administrator)

    The Internet is a major enabler for Organised Criminal Group (OCG) activity. Compared to making money from more traditional crimes, hacking individuals, SMEs and large organisations is a relatively low-cost, low-risk proposition for criminal groups - and there are many parts of the world where such activity is not actively prosecuted by the authorities. The cybercrime threat spans different contexts, and covers a wide range of online criminal activity, from scamming activity through to sophisticated attacks against financial institutions and other large organisations. Report outlines how cyber criminals are organised, their methods, and how their activities are monetised.

    Open publication

  • 26 Jul 2017 11:37 AM | Anonymous member (Administrator)

    The importance of disclosure in the criminal justice system cannot be underestimated. This report has identified a number of aspects of concern in the way that Crown Court trials are handled by the prosecution, and how police and the Crown Prosecution Service (CPS) manage effectively unused material relating to ‘volume’ casework at that venue. A number of issues have been identified in relation to how disclosure is managed, each of which is a matter of concern and has elicited a separate recommendation. However, just as importantly as responding to each issue, is a need for a change in attitude to ensure that disclosure is recognised as a crucial part of the criminal justice process and that it must be carried out to the appropriate standards

    Open publication

  • 24 Jul 2017 9:59 AM | Anonymous member (Administrator)

    The digital economy is very important to the UK – personal data and how it is handled is central to trade and growth and studies show the digital economy is growing 30% faster than the rest of the economy. Data knows no borders. Continued growth and citizen confidence in the digital economy needs an information rights regulator that is helpful, authoritative, tech-savvy and practical, but also a regulator that is firm and takes action when wrongdoing occurs. We also continue to work with stakeholders to ensure that data sharing for the purposes of law enforcement and security is promoted in a proportionate way.

    Open publication

  • 15 Jul 2017 7:51 PM | Anonymous member (Administrator)

    The ethical behaviour of businesses, especially the big ones, does much to set the ethical tone for our country, our times and our world. When business behaves badly – especially when the individuals and organisations involved somehow seem insulated from the consequences of their actions – everyone else looks on and adjusts their moral compass accordingly. The need for ethical leadership, not least by example, has never been greater.

    Open publication

  • 09 Jul 2017 8:52 PM | Anonymous member (Administrator)

    Scam calls have become a reality of our day-to-day lifes. At one time or another we will have all had to deal with scam calls or nuisance call on our mobiles and landlines. The scamming industry has become increasingly professionalised, targeting individuals who are least able to recognise the calls as complex scams. 

    Open publication

  • 22 Jun 2017 9:46 AM | Anonymous member (Administrator)

    The ninth-annual edition of one of the industry's most authoritative accounts of cybercrime trends brings you the latest findings on vulnerabilities, malware attacks, compromises, and more. The information contained in this 90-page report will keep you out of the dark and help guide your security decision-making over the next 12 months. Ten years ago, the prevailing information security paradigm was, fundamentally, still a reactive one focused on using anti-malware and IDS/IPS systems to defend the network against known threats. However, today’s world can’t afford that mind-set. The time for reactive thinking is over; it’s time to be proactive.

    Open publication

  • 22 Jun 2017 9:45 AM | Anonymous member (Administrator)

    The headline story of 2016 threat landscape was the explosive growth of ransomware and the massive email campaigns that delivered it to organisations of all sizes around the world. Highly personalized, targeted email campaigns focus on exploiting people, not just their technology. Spear-phishing email campaigns, which target specific people rather than indiscriminately seeking victims, were automated to operate at scale. Despite their large numbers, many included multiple personal details specific to the targeted recipient. Social engineering campaigns used documents with malicious macros and other techniques that tricked users into installing malware.

    Open publication

  • 17 Jun 2017 8:49 PM | Anonymous member (Administrator)

    Over the last five years the range of services that are vulnerable to fraud and corruption has grown. Not a day passes without hearing of the latest attempt to defeat the system. The fraudster and thief are becoming more sophisticated in their approach. The use of multiple data sources and sophisticated matching software has added to the intensity of the fight against fraud. The Cabinet Office have led and encouraged numerous projects which have not only achieved significant savings, but have heightened the awareness of the need to place the fight against fraud and corruption at the top of the public and private sector operational agendas.

Join the Network

Attend our conferences, master classes and events share knowledge and
best practices

Mailing List Signup

Non-members can find out about upcoming events
and masterclasses by
signing up here.

twitter   linkedin

Midlands Fraud Forum Ltd. Reg.No: 06436330
Copyright © March 2014
Disclaimer & Privacy Policy

Powered by Wild Apricot Membership Software