Do British Police Take Cyber Crime Seriously?

UK Police have stressed how seriously they treat cyber crime following a new report criticising how the growing trend is tackled by forces nationally. The National Audit Office (NAO) said the issue was "not yet a priority" for all local UK police forces and the problem had been overlooked by government, law enforcement and industry.

NAO chief Sir Amyas Morse said: "For too long, as a low value but high volume crime, online fraud has been overlooked by government, law enforcement and industry.
"It is now the most commonly experienced crime in England and Wales and demands an urgent response." He said the Home Office, while not solely responsible for tackling the issue, was the only organisation that could oversee the system and lead change.

A Durham Constabulary spokesperson said: “We take online fraud extremely seriously and have a dedicated team to investigate and safeguard people against such activity. 
“Our team regularly visit community organisations, banks and shops to educate people on the measures they can take to protect themselves from becoming a victim.
“We have recently launched our Blue Lights Discovery app to educate users in cyber security.
"This delivers interactive modules filled with cyber-crime history, threats, statistics and guidelines, all designed to make key knowledge available and accessible at all times. The app is available on both the Apple Store and Google Play Store.
“The force also has a dedicated Twitter account offering regular prevention advice and tips on cyber security.

Blue Lights Discovery, launched in conjunction with creative company Blue Lights Digital, delivers interactive modules filled with cyber crime history, threats, statistics and guidelines, all designed to make key knowledge available and accessible at all times.

Durham Chief Constable Mike Barton said: “We have all seen the increased rate in which these cyber-threats are worming their way into our devices, which means that now more than ever, it’s imperative that we know how to protect ourselves.
“Keeping these threats at bay is achieved through minimising risk and knowing what precautions to take, and that’s exactly what this app helps users to achieve.”

Sunderland Echo

You Might Also Read: 

UK Fraud Hotspots Revealed:

What Makes A  Cyber Criminal?:

 

« AI And Robotics Can Fight Cyber Crime
Reinventing Cold War Spy Craft »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

National Center for Manufacturing Sciences (NCMS)

National Center for Manufacturing Sciences (NCMS)

NCMS is a cross-industry technology development consortium, dedicated to improving the competitiveness of the US industrial base. Strategic initiatives include industrial cyber security.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

Hold Security

Hold Security

Hold Security works with companies of all sizes to provide unparalleled Threat Intelligence services that actually make a difference.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

Darkscope

Darkscope

Darkscope is an award-winning personalised cyber intelligence service provider. Our cutting-edge AI and Deep Artificial Neural Networks lead the world of cyber intelligence solutions.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Kingston Technology

Kingston Technology

Kingston is a leading global manufacturer of memory and storage solutions including encrypted storage solutions to protect data inside and outside the firewall.

Wing Security

Wing Security

Wing fosters a stronger security culture by engaging SaaS end-users and enabling easy communication with security teams.

American Technology Services (ATS)

American Technology Services (ATS)

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. From top-level strategy, to managed services and infrastructure support.

Crygma

Crygma

CRYGMA Quantum-Resistant Cryptographic Machines, the new standard in data encryption.

DeltaSpike

DeltaSpike

DeltaSpike empowers individuals and organizations worldwide through its comprehensive cybersecurity solutions.