Criminals Identify Deceased ID as Easy Target

 

Physical theft remains the quickest way to steal from an individual, but criminals now recognise the opportunities around information and identity theft, with 79 per cent saying ID fraud is easier than benefit fraud or burglary.

A survey among 53 ex-offenders carried out by Unlock on behalf of Wilmington Millennium found strong evidence that criminals are turning towards data-driven crimes over other options.
 
“We felt running this survey with the ex-offenders charity would give us some valuable insights into the issue of identity theft, but we were not quite prepared for what we found,” admits Karen Pritchard, product director, Halo, at Wilmington Millennium. “We expected that stealing wallets and credit cards would come out fairly high, but the fact that deceased identity fraud came second was a shock.”

As the top ten forms of identity theft reveal, a combination of physical, direct and data-driven approaches are now being adopted. While several of these rely on old-school confidence trickery, such as phishing, bogus texts or calls, or physical removal of mail or discarded documents, it is the harvesting of information to build a full profile and hijack accounts or identities, which is troubling.

“Companies should be using the resources that are in place. We capture deceased daily data and output our file weekly, so clients are getting information on deaths that have happened during that week,” says Pritchard. “So perhaps there is a problem with the processes at the clients’ end.”
CIFAS estimates that identity fraud has a £3.3 billion annual cost. “Criminals are very clever and see deceased identity fraud as an easy option. We know it is avoidable,” says Pritchard.

The ten top forms of identity theft are: stolen wallets/handbags, deceased identity fraud, mail theft, SMSishing, Dumpster diving, Phishing, Skimming and overlays, phone fraud, online fraud and change of address fraud.
DataIQ: http://bit.ly/1SscFHO

« Industrial Control Systems Vulnerable
US Agencies Freak Out Over Juniper Backdoor »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

Tymlez Software & Consulting

Tymlez Software & Consulting

Tymlez Software and Consulting is a start-up specialised in blockchain technology for enterprises.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

Ponemon Institute

Ponemon Institute

Ponemon Institute conducts independent research on data protection and emerging information technologies.

ngCERT

ngCERT

ngCERT is the National Computer Emergency Response Team for Nigeria.

Pluribus One

Pluribus One

Pluribus One develops customized solutions and other data-driven applications to secure your business and your devices.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

Shearwater Group

Shearwater Group

Shearwater Group is an award-winning organisational resilience group that provides cyber security, advisory and managed security services to help secure businesses in a connected global economy.

Componolit

Componolit

Componolit GmbH is a highly specialized company with a strong emphasis on trustworthy software, component-based systems and formal verification.

Regulativ.ai

Regulativ.ai

Regulativ.ai is an innovative and comprehensive platform, driven by AI, to address the regulatory and compliance needs of Cyber Security Regulatory compliance and reporting.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

Suffescom Solutions

Suffescom Solutions

Suffescom Solutions is a leading blockchain development company, assisting businesses in harnessing the true potential of blockchain technology.

Codezero Technologies

Codezero Technologies

Codezero is at the forefront of microservices development, employing an identity-aware overlay network that delivers zero-trust security to DevOps.

RunReveal

RunReveal

RunReveal's mission is to make sure no breach goes undetected. That means having a product that is accessible and effective for companies of all sizes.