Brexit Leading To Rising Tide Of Cyber Scams

Economic uncertainty following the Brexit vote is creating the perfect conditions for cyber-fraud, according to KPMG's Fraud Barometer.

The barometer measures cases reaching UK courts that are valued at more than £100,000. Although the extent of high-value fraud was seen to dip in this reporting period, the report said that this was a statistical anomaly.

Hitesh Patel, a forensic partner at KPMG, said the fraudsters constructed convincing “reputational illusions” in order to convince senior managers and owners of companies to hand over eye-watering sums of money.

This is helped by tight economic conditions, such as those anticipated as a result of Brexit, which will drive more businesses to try non-traditional methods of raising capital. In one case cited by KPMG, a shipping company was defrauded of £73 million by a man who said he had access to a secretive trading platform operated by the Pope. The company was desperate to purchase a new ship and the fraudster convinced the management it could leverage a 1200 percent return.

UK authorities are currently working on a number of fraud cases valued at more than £100 million each, and they were also carefully watching the healthcare sector where incidents of fraud are rising sharply.

"As the environment for business continues to be tight and competitive, fraudsters are able to hide easily among genuine businesses,” said Patel.

John Lord, managing director at identity data intelligence firm GBG, believes businesses could slow down the fraudsters by being more transparent with their data. “In the fight against fraud, businesses not only need to remain alert but also need to realise how effective data transparency can be as a way of battling fraud,” he said. “When data is shared freely between the public and private sectors, across geographical and political boundaries and amongst international bodies, a more accurate picture of global fraud patterns can be established.”

He added: “If everything is secret, how can anything be checked or corroborated? By being able to use accurate data to connect the dots, predict algorithms and identify behaviour patterns, we can start to build up an intelligent view of fraud, on a global scale.”

SC Magazine

 

 

« EU Cyber Crime Commissioner is King
Mobile Battery Tracks You Online »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

European Internet Forum (EIF)

European Internet Forum (EIF)

EIF’s mission is to help provide European political leadership for the political, economic and social challenges of the worldwide digital transformation.

Industrial Cyber-Physical Systems Center (iCyPhy)

Industrial Cyber-Physical Systems Center (iCyPhy)

The goal of iCyPhy is to conduct pre-competitive research on architectures and design, modeling, and analysis techniques for cyber-physical systems.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

Sangfor Technologies

Sangfor Technologies

Sangfor is a global leader of IT infrastructure, security solutions, and cloud computing.

Span

Span

Span designs, develops and maintains information systems based on advanced technological solutions of global IT leaders.

CERT-PH

CERT-PH

CERT-PH is the National Computer Emergency Response Team and the highest body for cybersecurity related activities in the Philippines.

Digital Law

Digital Law

Digital Law is the only UK law firm to specialise solely in online, data and cyber law.

CUJO AI

CUJO AI

CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses.

Adlumin

Adlumin

Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure.

SAST

SAST

SAST provide Static Application Security Testing as a service based on SAST Tools.

Cyber Security Advisor

Cyber Security Advisor

Notice how sophisticated the cybersecurity market is. Think how would you pick the security provider, assess your company, and be sure of your security decisions? Cyber Security Advisor is the answer!

CISO Global

CISO Global

CISO Global (formerly Cerberus Sentinel) are on a mission to demystify and accelerate our clients’ journey to cyber resilience, empowering organizations to securely grow, operate, and innovate.

Valeo Networks

Valeo Networks

Valeo Networks is a full-service Managed Security Service Provider (MSSP). We partner with organizations to remove the burden of technology so that they can focus on growing their business.

Protecto

Protecto

Make privacy and governance effortless. Brakes allow you to drive faster. Stronger data privacy and security enable companies to unlock the full potential of the data.

Neosoft

Neosoft

Néosoft is an independent digital transformation consulting group with expertise in Consulting & Agility, Cybersecurity, Data, DevOps, Infrastructure & Cloud and Software Engineering.