Brexit Leading To Rising Tide Of Cyber Scams

Economic uncertainty following the Brexit vote is creating the perfect conditions for cyber-fraud, according to KPMG's Fraud Barometer.

The barometer measures cases reaching UK courts that are valued at more than £100,000. Although the extent of high-value fraud was seen to dip in this reporting period, the report said that this was a statistical anomaly.

Hitesh Patel, a forensic partner at KPMG, said the fraudsters constructed convincing “reputational illusions” in order to convince senior managers and owners of companies to hand over eye-watering sums of money.

This is helped by tight economic conditions, such as those anticipated as a result of Brexit, which will drive more businesses to try non-traditional methods of raising capital. In one case cited by KPMG, a shipping company was defrauded of £73 million by a man who said he had access to a secretive trading platform operated by the Pope. The company was desperate to purchase a new ship and the fraudster convinced the management it could leverage a 1200 percent return.

UK authorities are currently working on a number of fraud cases valued at more than £100 million each, and they were also carefully watching the healthcare sector where incidents of fraud are rising sharply.

"As the environment for business continues to be tight and competitive, fraudsters are able to hide easily among genuine businesses,” said Patel.

John Lord, managing director at identity data intelligence firm GBG, believes businesses could slow down the fraudsters by being more transparent with their data. “In the fight against fraud, businesses not only need to remain alert but also need to realise how effective data transparency can be as a way of battling fraud,” he said. “When data is shared freely between the public and private sectors, across geographical and political boundaries and amongst international bodies, a more accurate picture of global fraud patterns can be established.”

He added: “If everything is secret, how can anything be checked or corroborated? By being able to use accurate data to connect the dots, predict algorithms and identify behaviour patterns, we can start to build up an intelligent view of fraud, on a global scale.”

SC Magazine

 

 

« EU Cyber Crime Commissioner is King
Mobile Battery Tracks You Online »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Nuix

Nuix

Nuix specialise in extracting knowledge from unstructured data. Applications include Digital Forensics, Cybersecurity Intelligence, Information Governance, eDiscovery.

Green Hills Software

Green Hills Software

Green Hills Software is the largest independent vendor of embedded secure software solutions for applications including the Internet of Things.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

Garrison Technology

Garrison Technology

Garrison SAVI® is a unique technology for secure remote browsing that can dramatically change the risk profile for enterprise cyber security.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

Global Cyber Alliance (GCA)

Global Cyber Alliance (GCA)

Global Cyber Alliance is an international, cross-sector effort dedicated to eradicating cyber risk and improving our connected world.

ICTSecurity Portal

ICTSecurity Portal

The ICTSecurity Portal is an interministerial initiative in cooperation with the Austrian economy and acts as a central internet portal for topics related to security in the digital world.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

PureCyber

PureCyber

PureCyber (formerly Wolfberry Cyber) is an award-winning cyber security consultancy whose goal it is to make cyber security accessible, understandable, and affordable for any organisation.

Utility Cyber Security Forum

Utility Cyber Security Forum

The Utility Cyber Security Forum offers a focused venue in which utility executives can network one-on-one with colleagues facing issues in protecting against cyber attacks.

Practical Assurance

Practical Assurance

Practical Assurance helps companies navigate the rough terrain of information security compliance.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

Nettoken

Nettoken

Nettoken is the first identity management platform designed for everyday internet users, to encourage awareness and control of our ever expanding digital footprint and personal cybersecurity.

Chainlink

Chainlink

Chainlink expands the capability of smart contracts by enabling access to real-world data and systems without sacrificing the security and reliability guarantees inherent to blockchain technology.

Sparrow

Sparrow

Sparrow specializes in application security testing solutions to cope with new technology trends such as cloud, mobile, and DevSecOps.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.