Fraud and the Internet Sandra Peaston Deputy Head of Financial - - PowerPoint PPT Presentation

fraud and the internet
SMART_READER_LITE
LIVE PREVIEW

Fraud and the Internet Sandra Peaston Deputy Head of Financial - - PowerPoint PPT Presentation

Fraud and the Internet Sandra Peaston Deputy Head of Financial Crime and Strategic Intelligence 10 th February 2015 This evenings presentation What is Cifas The Identity Fraud Problem Reeling you in how phishing works Fraud in


slide-1
SLIDE 1

Fraud and the Internet

Sandra Peaston Deputy Head of Financial Crime and Strategic Intelligence 10th February 2015

slide-2
SLIDE 2

This evening’s presentation

What is Cifas The Identity Fraud Problem Reeling you in – how phishing works Fraud in Hammersmith and Fulham How to avoid being a victim What to do if you are a victim

slide-3
SLIDE 3

What is Cifas?

Preventing fraud through confirmed fraud data sharing since 1988

A not-for-profit membership organisation – National Fraud Database and Internal Fraud Database Funded and driven by 300+ organisations (public and private sector) Data is shared across organisations and law enforcement under the Data Protection Act (1998) and The Serious Crime Act (2007) Fraud data is non-competitive: Shared benefits from communication, cooperation and collaboration to prevent crime

£4.1 billion in reported fraud prevention savings in the last 5 years

slide-4
SLIDE 4

Fraud in 2014

277,000 fraud cases identified - ▲25%

50,000 100,000 150,000 200,000 250,000 300,000 2008 2009 2010 2011 2012 2013 2014

slide-5
SLIDE 5

Identity Fraud

114,000 cases of Identity Fraud recorded - ▲5%

20,000 40,000 60,000 80,000 100,000 120,000 140,000 2010 2011 2012 2013 2014

slide-6
SLIDE 6

Identity Fraud and the Internet

4 out of 5 Identity Fraud are perpetrated

  • ver the internet

Anonymity Volume Speed Electronic identity verification

But online security helps to counter the threat

takeover of existing accounts ▼38% Intelligent data sharing prevents fraud Software solutions e.g. Device recognition

slide-7
SLIDE 7

Open source information – Company’s House, Land Registry etc. Staff insiders Database breaches Malware – malicious software You – Social Engineering

Where does the data come from?

slide-8
SLIDE 8

Social Engineering

“Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information”

Wikipedia – Social engineering (security)

http://en.wikipedia.org/wiki/Social_engineering_(security)

The weak link in the chain is often human

slide-9
SLIDE 9

Phishing

Phishing – social engineering by email

To convince the victim to transfer money directly and or disclose personal information To capture credentials via fake (spoofed) websites To infect computers with virus’ in malicious webpages To infect computers with virus’ in attachments

1 in 392 emails in 2013 (1 in 414 in 2012)

slide-10
SLIDE 10

Really not sophisticated

slide-11
SLIDE 11

More sophisticated

slide-12
SLIDE 12

Really clever

slide-13
SLIDE 13

Common “tells”

Not expecting the email Not registered with the website Broken formatting Spelling/grammar mistakes Not in the email recipient list Not addressed by name Email requires action – click on link/open file Message conveys a sense of urgency Hovering over the link shows a different destination

http://www.actionfraud.police.uk/report_fraud

slide-14
SLIDE 14

Hacks

This is not new – these have been going

  • n for years

Attacks were to obtain intellectual property Now attacks are for:

Fun Disruption IP theft Personal data theft

1,367 confirmed data breaches in 2013 globally

Verizon 2014 Data Breach Investigations Report

slide-15
SLIDE 15

ID Crime victims in London

slide-16
SLIDE 16

ID Crime victims in Hammersmith & Fulham

slide-17
SLIDE 17

Fraud in Hammersmith & Fulham

1,187 1,201 1,268 573 614 697

200 400 600 800 1,000 1,200 1,400 2012 2013 2014 Frauds Victims of ID crime

slide-18
SLIDE 18

Avoid being a victim

Keep your identity safe limit the amount of personal information you give away

  • n social networking sites

update your computer's firewall, anti-virus and anti- spyware programmes never share your passwords or PINs with others, and do not write them down use strong passwords and PINs don't use the same password or PIN for more than one account shred all your financial documents before you throw them away If someone asks for your personal details either online

  • r on the phone, and you have doubts about why they

need them, check first. If you're in any doubt, don’t disclose

https://www.cifas.org.uk/avoid_being_a_victim

slide-19
SLIDE 19

Avoid being a victim

Keep your devices secure Encrypt your wireless network to the highest possible setting - ideally WPA2 Delete your web browser history and cookies regularly Use different email addresses and different passwords for your various online accounts Never visit any website that uses financial details (such as banking or shopping) from a public wi-fi hotspot Block spam emails. Never respond to unsolicited emails Hovering the mouse cursor over a link will often reveal the real address of the page it's sending you to When using smartphones or tablets, make sure you use all the device's security features such as passwords and PINs. Remember to lock all devices when you're not using them Avoid publicising your travel plans or posting holiday pictures while you're away from home

https://www.cifas.org.uk/avoid_being_a_victim

slide-20
SLIDE 20

If you are a victim

Check your bank, credit card and other financial statements If regular statements or other items of post don't arrive, contact the organisations concerned Do the same if you start receiving correspondence from companies about applications or accounts that you do not recognise Investigate any credit refusal - it could be a sign that your credit report has been damaged Contact one of the credit reference agencies. They can help you review your credit report and contact all of the

  • rganisations involved for you. They will also notify the
  • ther two credit reference agencies so they too can
  • ffer help

Consider a Cifas Protective Registration

slide-21
SLIDE 21

Cifas – Leaders in fraud prevention

Protecting the public

Protective Registration Service

Protects those at a heightened risk of ID Crime Bulk services available to companies which have suffered a breach in order to protect their customers

Protecting the vulnerable

Designed for those subject to a court order of protection under the Mental Capacity Act 2005 and not able to request financial or other services

Public messaging

Key prevention messages

slide-22
SLIDE 22
slide-23
SLIDE 23

Questions?