UK Victims Lose £28m To Cybercrime In 6 Months

The City of London Police, the national lead force for fraud which runs Action Fraud, the national fraud and cyber-crime reporting centre, has revealed that cybercrime victims lost £28 million between October 2017 and March 2018.

The cyber statistics are based on the 12,372 cyber-crime reports that were made in the same six-months period to Action Fraud. The City of London Police, which is a founding member of the Global Cyber Alliance, also runs Cyber Protect, its team dedicated to protecting the public and businesses from fraud and cyber-crime.

The report also shows that with 4,796 reports, hacking of social media and email accounts was the primary reason for people reporting cybercrime to Action Fraud. These victims are believed to have lost a total of £11 million. Unlike most other crimes, cybercrime is often committed by criminals who never come into contact with their victim, and around half of all fraud and cybercrime comes from abroad.

A national reporting service means the UK can better identify investigate and detect fraud and cyber-crime.

Protect Yourself
The key to protecting yourself from cyber-crime is to always install the latest software and app updates on your phone and computers as they contain vital security updates which help protect your device from viruses and hackers. 
You should also ensure that you use a strong, separate password for your email account, as hackers can use your email to access many of your other personal accounts. Consider also enabling two factor authentication (also known as two step authentication or two step login) where services support it.

For protection advice based on the expertise of the National Cyber Security Centre and specifically targeted at protecting small businesses and individuals from cyber criminals, please visit Cyber Aware.

Temporary Commander Pete O’Doherty of the City of London Police said: “Cyber-crime is a growing trend. In particular criminals are targeting social media users and online account holders in a bid to make money and steal personal details. This leaves victims out of pocket and at risk of identity theft.

 “To avoid falling victim, it’s important that people keep a strong, separate password for their email accounts. Always be suspicious of unsolicited requests for your personal or financial information and never call numbers or follow links provided in unsolicited texts or emails; contact the company directly using a verified and trusted email or phone number. If you or someone you know believes they have fallen victim to cyber-crime, please report it to Action Fraud.”

Action Fraud

You Might Also Read: 

Digital Shock: Cybercrime & The Future Of Policing. Part 3 (£):

Cryptocurrency Cybercrime Surging In The UK:

 

« British Airways Faces £Multimillion Fine
The 'Deep Web' May Be x 500 Bigger Than The ‘Normal Web’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Spambrella

Spambrella

Spambrella provides email security with real-time threat protection. 100% SaaS (nothing to install)

DoSarrest Internet Security Ltd

DoSarrest Internet Security Ltd

DOSarrest is a fully managed security firm specializing in cloud based DDoS protection services to a worldwide client base.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

Tubitak

Tubitak

Tubitak is the scientific and technological research council of Turkey. Areas of research include information technology and security.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

Watchcom Security Group

Watchcom Security Group

Watchcom is one of Norway's foremost suppliers of information security consultancy services.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

SoftLock

SoftLock

Softlock is a regional leader in Information Security providing solutions, consulting, integration and testing services to protect information assets, identities and supporting infrastructure.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Wiz

Wiz

Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads.

Cyber Security Cooperative Research Centre (CSCRC)

Cyber Security Cooperative Research Centre (CSCRC)

The CSCRC provides frank and fearless research and in-depth analysis of cyber security systems, the cyber ecosystem and cyber threats.

nsKnox

nsKnox

nsKnox is a fintech-security company, enabling corporations and banks to prevent fraud and ensure compliance in B2B Payments.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.

NorthRow

NorthRow

NorthRow provides digital transformation compliance solutions to help businesses manage regulatory and financial crime risks.

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

Halo Security

Halo Security

Halo Security is a fast, easy, and scalable external attack surface management platform that gives security leaders deep visibility into their internet-facing assets.