2018 Publications

A collection of useful documents from various sources around the internet.

Search articles by keyword

  • 05 Apr 2018 5:27 PM | Anonymous member (Administrator)

    Many of the services provided by the force to vulnerable people are good, but HMICFRS most recent inspection found WMP failing to protect some victims adequately. Staff are generally good at identifying vulnerable people when they first contact the police, but at the time the inspection there were often not enough officers available to respond to incidents quickly when required. This means that victims, including some who are vulnerable, do not always receive the response they need, and may be put in danger as a result.

    Open publication

  • 25 Mar 2018 7:17 PM | Anonymous member (Administrator)

    Email fraud, also known as business email compromise (BEC), is one of today’s greatest cyber threats. These socially engineered attacks seek to exploit people rather than technology. They are highly targeted, don’t include attachments or URLs, arrive in low volumes, and impersonate people in authority. These and other factors make email fraud difficult to detect and stop with traditional security tools. Email fraud, which spans a range of attacks and techniques, was rife in 2017.

    Open publication

  • 25 Mar 2018 7:14 PM | Anonymous member (Administrator)

    Building a fraud-resilient charity is a job for everyone, everywhere, and at every level. All trustees and managers should have the knowledge and skills to recognise the tell-tale signs of fraud and then shape an effective and proportionate response. This guide is for trustees and senior managers of charities in England and Wales as well as their professional advisers. It summarises the main lessons and messages from the second national charity fraud conference and second national charity fraud awareness week. It also provides pointers to additional expert sources of information, support and best practice.

    Open publication

  • 01 Mar 2018 9:11 AM | Anonymous member (Administrator)

    Last year, we saw how big-name enterprises were victimized by different forms of cybercrime, with huge amounts of money and information lost in the process. This roundup reviews the major cybersecurity stories and trends that surfaced in 2017. Ultimately, it aims to further highlight the importance of adopting smart security strategies for enterprises to be protected against risks and attacks from across the entire threat landscape.

    Open publication

  • 25 Feb 2018 10:51 PM | Anonymous member (Administrator)

    The findings from this year’s GECS confirm that the long-term global trend towards higher levels of fraud is continuing, and clearly show the destructive impact that this rising tide of economic crime is having on businesses. Experience shows that times of uncertainty often create new openings for fraudsters to exploit gaps or weaknesses in controls, and it’s significant that over a quarter of respondents to our survey felt that the current geopolitical climate would lead to more opportunities for people to commit fraud. As such findings underline, it’s now more crucial than ever that businesses understand the fraud risk landscape and all the possible avenues of attack.

    Open publication

  • 18 Feb 2018 6:29 PM | Anonymous member (Administrator)

    A broken link involving just one of your suppliers can send security concerns down your entire chain. The purpose of this whitepaper is to understand and reveal more about the relationship between organisations and third-party suppliers when it comes to cybersecurity. It also looks at data breach risk and response, and the impact on and views of consumers.

  • 11 Feb 2018 4:48 PM | Anonymous member (Administrator)

    Phishing describes a type of social engineering where attackers influence users to do 'the wrong thing', such as disclosing information or clicking a bad link. Phishing can be conducted via a text message, social media, or by phone, but these days most people use the term 'phishing' to describe attacks that arrive by email. ‘Phishing Attacks: Defending Your Organisation’ contains advice on how organisations can defend themselves against malicious emails that use social engineering techniques.

    Open publication

  • 04 Feb 2018 4:42 PM | Anonymous member (Administrator)

    This year’s report addresses the diverse range of fraud-, cyber-, and security-related challenges that organizations are facing around the world and across a variety of industry sectors. In this Report, executives offer an insider’s perspective on the nature of incidents their organizations have experienced over the last 12 months, along with insights into the perpetrators and methods employed. These executives also share specific steps they are taking to anticipate, detect, mitigate, and respond to an expanding and increasingly complex set of risks that bring with them material consequences, including potentially adverse financial and reputational impacts.

    Open publication

  • 04 Feb 2018 4:40 PM | Anonymous member (Administrator)

    Shows a growth overall in the amount of fraud that has been detected and prevented. This shows the commitment we are making as an industry to better protect ourselves and our customers. The fraud landscape is interesting, and the analysis shows we are starting to swing back to First Party fraud being the most dominant threat. When we look at where fraud occurs, we see pretty much what you expect: urban centres light up. London, the East End, North and South continue to be the hot spot of the UK both for First, and Third Party fraud.

    Open publication

  • 18 Jan 2018 9:19 AM | Anonymous member (Administrator)

    Whistleblowing continues to make the headlines and the role of the whistle blower has become ever more prominent in recent times. Almost 40 per cent of all detected occupational fraud cases are identified by whistle blowers.  And when businesses uncover wrongdoing within their organisation, it is usually an employee who raised the first red flag. There are risks associated with any whistleblowing system (particularly one that allows anonymous reporting), the main risk being that employees might abuse the system and make false reports. These risks are, however, materially outweighed by the clear interest businesses have in ensuring that the right whistleblowing framework and culture is in place to encourage employees to speak up without fear of retaliation.

    Open publication

Join the Network

Attend our conferences, master classes and events share knowledge and
best practices

Mailing List Signup

Non-members can find out about upcoming events
and masterclasses by
signing up here.

twitter   linkedin

Midlands Fraud Forum Ltd. Reg.No: 06436330
Copyright © March 2014
Disclaimer & Privacy Policy

Powered by Wild Apricot Membership Software