Criminals Identify Deceased ID as Easy Target

 

Physical theft remains the quickest way to steal from an individual, but criminals now recognise the opportunities around information and identity theft, with 79 per cent saying ID fraud is easier than benefit fraud or burglary.

A survey among 53 ex-offenders carried out by Unlock on behalf of Wilmington Millennium found strong evidence that criminals are turning towards data-driven crimes over other options.
 
“We felt running this survey with the ex-offenders charity would give us some valuable insights into the issue of identity theft, but we were not quite prepared for what we found,” admits Karen Pritchard, product director, Halo, at Wilmington Millennium. “We expected that stealing wallets and credit cards would come out fairly high, but the fact that deceased identity fraud came second was a shock.”

As the top ten forms of identity theft reveal, a combination of physical, direct and data-driven approaches are now being adopted. While several of these rely on old-school confidence trickery, such as phishing, bogus texts or calls, or physical removal of mail or discarded documents, it is the harvesting of information to build a full profile and hijack accounts or identities, which is troubling.

“Companies should be using the resources that are in place. We capture deceased daily data and output our file weekly, so clients are getting information on deaths that have happened during that week,” says Pritchard. “So perhaps there is a problem with the processes at the clients’ end.”
CIFAS estimates that identity fraud has a £3.3 billion annual cost. “Criminals are very clever and see deceased identity fraud as an easy option. We know it is avoidable,” says Pritchard.

The ten top forms of identity theft are: stolen wallets/handbags, deceased identity fraud, mail theft, SMSishing, Dumpster diving, Phishing, Skimming and overlays, phone fraud, online fraud and change of address fraud.
DataIQ: http://bit.ly/1SscFHO

« Industrial Control Systems Vulnerable
US Agencies Freak Out Over Juniper Backdoor »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyberis

Cyberis

Cyberis are pioneers in customer-focussed information security. Since 2011, we’ve been helping businesses protect their brands, customers and reputation.

Open Networking Foundation (ONF)

Open Networking Foundation (ONF)

The Open Networking Foundation (ONF) is a non-profit operator led consortium driving transformation of network infrastructure and carrier business models.

Bricata

Bricata

Bricata offers industry-leading IPS solutions for enterprise-wide threat prevention and unparalleled situational awareness.

Emerson Electric Co

Emerson Electric Co

Emerson provides industrial automation systems and associated cybersecurity solutions to protect critical process control systems from cyber attack.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

Irish National Accreditation Board (INAB)

Irish National Accreditation Board (INAB)

INAB is the national accreditation body for Ireland. The directory of members provides details of organisations offering certification services for ISO 27001.

Norsk Akkreditering

Norsk Akkreditering

Norsk Akkreditering is the national accreditation body for Norway. The directory of members provides details of organisations offering certification services for ISO 27001.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers.

BullGuard

BullGuard

BullGuard is an award-winning cybersecurity company focused on providing the consumer and small business markets with the confidence to use the internet in absolute safety.

Dynatrace

Dynatrace

Dynatrace provides software intelligence to simplify cloud complexity and accelerate digital transformation.

Accurics

Accurics

Accurics enables self-healing cloud native infrastructure by codifying security throughout your development lifecycle.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

Mirai Security

Mirai Security

Mirai Security are a cyber security company that specializes in Governance, Risk Management and Compliance, Cloud Security and Application Security.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.