Do British Police Take Cyber Crime Seriously?

UK Police have stressed how seriously they treat cyber crime following a new report criticising how the growing trend is tackled by forces nationally. The National Audit Office (NAO) said the issue was "not yet a priority" for all local UK police forces and the problem had been overlooked by government, law enforcement and industry.

NAO chief Sir Amyas Morse said: "For too long, as a low value but high volume crime, online fraud has been overlooked by government, law enforcement and industry.
"It is now the most commonly experienced crime in England and Wales and demands an urgent response." He said the Home Office, while not solely responsible for tackling the issue, was the only organisation that could oversee the system and lead change.

A Durham Constabulary spokesperson said: “We take online fraud extremely seriously and have a dedicated team to investigate and safeguard people against such activity. 
“Our team regularly visit community organisations, banks and shops to educate people on the measures they can take to protect themselves from becoming a victim.
“We have recently launched our Blue Lights Discovery app to educate users in cyber security.
"This delivers interactive modules filled with cyber-crime history, threats, statistics and guidelines, all designed to make key knowledge available and accessible at all times. The app is available on both the Apple Store and Google Play Store.
“The force also has a dedicated Twitter account offering regular prevention advice and tips on cyber security.

Blue Lights Discovery, launched in conjunction with creative company Blue Lights Digital, delivers interactive modules filled with cyber crime history, threats, statistics and guidelines, all designed to make key knowledge available and accessible at all times.

Durham Chief Constable Mike Barton said: “We have all seen the increased rate in which these cyber-threats are worming their way into our devices, which means that now more than ever, it’s imperative that we know how to protect ourselves.
“Keeping these threats at bay is achieved through minimising risk and knowing what precautions to take, and that’s exactly what this app helps users to achieve.”

Sunderland Echo

You Might Also Read: 

UK Fraud Hotspots Revealed:

What Makes A  Cyber Criminal?:

 

« AI And Robotics Can Fight Cyber Crime
Reinventing Cold War Spy Craft »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

HDI

HDI

HDI is the worldwide professional association and certification body for the technical service and support industry.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

Promon

Promon

Promon is an application security vendor providing Self-Protection abilities to Mobile apps and Desktop applications.

IntSights

IntSights

IntSights is an intelligence driven security provider offering rapid, accurate cyberthreat intelligence and incident mitigation in real time

CyberSmart

CyberSmart

CyberSmart is a platform that allows you to maintain compliance, achieve certification and secure your organisation.

DynaRisk

DynaRisk

DynaRisk helps companies protect their staff, clients and supply chain from cyber threats by enabling people to take action for themselves.

BEAM Teknoloji

BEAM Teknoloji

BEAM Technology is an independent Software Quality and Security Testing Center in Turkey.

Ampliphae

Ampliphae

Ampliphae gives you an easy-to-deploy, sophisticated and affordable cloud-discovery, security and compliance platform.

Nihon Cyber Defense

Nihon Cyber Defense

Nihon Cyber Defence’s mission is to provide robust solutions, services and support to governments, corporates and organisations in order to protect them from all forms of cyber warfare.

K2 Cyber Security

K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

Intrepid Solutions and Services

Intrepid Solutions and Services

Intrepid Solutions and Services provides technology solutions and professional services to key components of the intelligence and national security communities.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Zuul IoT

Zuul IoT

Zuul take an asset-centric approach to OT security, enabling security teams to protect the critical IIoT/IoT devices that are at the foundation of critical business functions.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.