Brexit Leading To Rising Tide Of Cyber Scams

Economic uncertainty following the Brexit vote is creating the perfect conditions for cyber-fraud, according to KPMG's Fraud Barometer.

The barometer measures cases reaching UK courts that are valued at more than £100,000. Although the extent of high-value fraud was seen to dip in this reporting period, the report said that this was a statistical anomaly.

Hitesh Patel, a forensic partner at KPMG, said the fraudsters constructed convincing “reputational illusions” in order to convince senior managers and owners of companies to hand over eye-watering sums of money.

This is helped by tight economic conditions, such as those anticipated as a result of Brexit, which will drive more businesses to try non-traditional methods of raising capital. In one case cited by KPMG, a shipping company was defrauded of £73 million by a man who said he had access to a secretive trading platform operated by the Pope. The company was desperate to purchase a new ship and the fraudster convinced the management it could leverage a 1200 percent return.

UK authorities are currently working on a number of fraud cases valued at more than £100 million each, and they were also carefully watching the healthcare sector where incidents of fraud are rising sharply.

"As the environment for business continues to be tight and competitive, fraudsters are able to hide easily among genuine businesses,” said Patel.

John Lord, managing director at identity data intelligence firm GBG, believes businesses could slow down the fraudsters by being more transparent with their data. “In the fight against fraud, businesses not only need to remain alert but also need to realise how effective data transparency can be as a way of battling fraud,” he said. “When data is shared freely between the public and private sectors, across geographical and political boundaries and amongst international bodies, a more accurate picture of global fraud patterns can be established.”

He added: “If everything is secret, how can anything be checked or corroborated? By being able to use accurate data to connect the dots, predict algorithms and identify behaviour patterns, we can start to build up an intelligent view of fraud, on a global scale.”

SC Magazine

 

 

« EU Cyber Crime Commissioner is King
Mobile Battery Tracks You Online »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Identiv

Identiv

Identiv is a global security technology company that establishes trust in the connected world, including premises, information and everyday items.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

Sift

Sift

The Sift Digital Trust Platform protects your business and customers from all vectors of fraud and abuse through our Live Machine Learning, global trust network and automation technologies.

Tempered Networks

Tempered Networks

Tempered Networks delivers the first purpose-built platform for IIoT cybersecurity that allows customers to connect and secure devices in minutes without the need for specialized skills.

Cyphercor

Cyphercor

Cyphercor is a leading smartphone and desktop-based two-factor authentication (2FA) provider.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

Protocol Labs

Protocol Labs

Protocol Labs is a research, development, and deployment institution for improving Internet technology.

Quantum Generation

Quantum Generation

Quantum Cyber Security for a new age of communications. We are developing the largest decentralized orbital, and ground quantum mesh network based on blockchain technology.

Nexor

Nexor

Nexor are a UK-based cyber security company with 30 years' experience in secure information exchange.

Qrypt

Qrypt

Qrypt has developed the only cryptographic solution capable of securing information indefinitely with mathematical proof as evidence.

BriskInfosec Technology & Consulting

BriskInfosec Technology & Consulting

BriskInfosec provides information security services, products and compliance solutions to our customers.

Bugbank

Bugbank

Bugbank (aka Vulnerability Bank) is a leading SaaS platform for internet security services in China.

Fullstack Academy

Fullstack Academy

A trailblazer in bootcamp education, Fullstack Academy prepares students for fulfilling careers in tech through our NYC campus, online learning, and university partnerships.