Action Fraud: An introduction Steve Proffitt Deputy Head of Action Fraud.

Slides:



Advertisements
Similar presentations
First Contact Scheme. AGENDA House keeping Introductions & Warm up Overview of the First Contact Scheme Who is vulnerable? When to use First Contact How.
Advertisements

Visit us now at – Our site has plenty of great new services being added all the time! So come on in and enjoy them! (Subject to change.
Welcome to informaworld TM. The following demo will show you just a few of the features on informaworld TM. Please select where you would like start. ePublication.
What is Symbaloo? Home Always a fast start, your favorite websites, online tools, and resources organized on your homepage. Personal Organize your favorite.
Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
Choose and Book Archive New functionality from November 2012.
Copyright © 2005 EFT Network, Inc. All Rights Reserved. Automated Recurring Payments Flexible Payment Solution.
Social Media Marketing: From Mystery to Mastery Tweet and Connect Presented by Linnea Blair Advisors On Target June 16, 2011.
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
An overview of Health and Health Service Information at NHS Direct December 2007 Kim Diprose – Health Information Manager (Library & Information Services)
Starter for 10 Unit 3: Stay safe online Transform IT SFT03_stay_safe_online.
EBSCO’s Ten Minute Training Series EBSCO’s New One-Step RSS Feed Alerts, plus Search and Journal Alerts Search and Journal Alerts by Marcie Brown, EBSCO.
Effective Use of Your Web site June 29, Agenda  Introduction  Statistics  Observations  Your Web Goals  Increasing Traffic  Optimizing the.
Electronic Commerce Systems
Social Media For UK Businesses May 2010 David Clarke
A guide to GRANTnet. Overview Introduction to GRANTnet Registering to use GRANTnet Accessing GRANTnet How to conduct a comprehensive search Refine search.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Tech Made Simple: Boosting Your Business Using Technology.
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
How we can improve YOUR online marketing. Housekeeping Toilets Emergency Phones Partners Stuff.
Police and Crime Commissioners: Project 5a communications update PCC Transition Overall Project 5 Board 25 July.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
IT security By Tilly Gerlack.
Web 2.0 Social Bookmarking and Start Pages in the Classroom Sally Todd, St John’s School Library, April 2009.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Welcome to corporate.eircom.ie This presentation aims to give you an overview of corporate.eircom.ie, what it offers you and how best to navigate your.
Internet Security & Safety. What makes up the internet? Protecting and securing your password Protecting your identity What is social networking? Benefits.
For Real Estate Agents Farming Equipment Heavy Equipment Real Estate Motor Vehicles.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Support.ebsco.com My EBSCOhost Tutorial Tutorial.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
What is Symbaloo? Home Always a fast start, your favorite websites, online tools, and resources organized on your homepage. Personal Organize your favorite.
Online Friends’ Community Presented by: Stuart Monaghan HND in Computing th May 2002.
Client/User Analysis Website Design. 2 Questions to be answered: What is the purpose of the site? What is the purpose of the site? Who is the site for?
How to find LFHHS Online on Facebook LFHHS Online LFHHS Online – Steve Williams 2015.
Introduction to EBSCOhost Tutorial support.ebsco.com.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
FP6 Partners 1 Partners for FP6 PARTNERS IN PROJECTS FP6 Aalborg, Denmark Nov
December 4 th 2015 Intelligence Briefing NOT PROTECTIVELY MARKED.
Knowledge Services Group Introduction The shared space is to aid communication and sharing of knowledge for staff working in remote and rural care Encourage.
In addition to our other quality services, we now offer a Web Accessible Database to view, print, or download your Calibration and Gas Analysis reports.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Your clients’ accounts and banking working together. Online.
Policies and Security for Internet Access
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
Communications Team West Sussex Care Month Increase referrals to Carewise and visits to its online information. Increase visits to Connect to Support,
Basically; teaching your children how to stay safe when using the internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
ENERGY ADVICE LINE UK We find the cheapest business electricity in the market.cheapest business electricity Website:
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
How does it work? Properties ABC Online Letting Website Communicate online with us Arrange viewing online with one click Get legally tight generated paperwork.
ICT in Product Manufacture ISDN, LAN, WAN, Intranets and extranets, global networks
ePartner Portal for A/C Managers -
Rod Rivers, Lead for Online Services
Arab Open University (AOU)
 Contact Number  Id –
How to install Kaspersky Antivirus. About Kaspersky Antivirus: Kaspersky Antivirus has many features which includes real time protection, removal of rootkits,
Tutorial Introduction to support.ebsco.com.
Welcome and thank you for choosing SharkGate
THIS PRESENTATION The College Essentials Support from the College
THIS PRESENTATION The College Essentials Support from the College
Tutorial Introduction to help.ebsco.com.
Wolves of the Internet: Where do fraudsters hunt for data online?
Thames Valley Chamber / Claire Logic
Presentation transcript:

Action Fraud: An introduction Steve Proffitt Deputy Head of Action Fraud

Joint management board Action Fraud: governance

Action Fraud: service offering Online information source Online crime reporting Specialist phone advice Over the phone crime reporting Fulfilment advice Referral to victim support Non-fraud signposting E-Alerts through facebook, Twitter and on-line AF Update e-newsletter

Report: crime report chain    

Used by the contact centre team Available to the public via the Action Fraud website Meets the national standards for crime recording Triages to see if a crime should be recorded Signposts to relevant organisations for support Web based front end Remote hosted database Secure https site Data transferred by secure link to the NFIB at City of London Police reportfraud.actionfraud.org.uk/fraudreport/ Report: Online tool

The first section of the tool seeks to identify crime in action and will signpost to the police

Report: Online tool The triage section helps the customer identify which type of fraud they may have been victim to

Report: Online tool features This shows users where they are in the tool Questions are kept simple and closed wherever possible Simple buttons are used to navigate Page styling is uniform throughout Contact details are always visible Accessibility features are included on each page

Service to date This graph shows the number of calls and web contacts made to action fraud with the resulting information, crime and “none of the above” reports that were sent to the NFIB.

Report: web traffic January 2012

Report: by fraud type This chart demonstrates the types of fraud crimes that victims encountered over Source: Reporting Portal/XML Extract August

Report: UK geography This chart provides a breakdown of reports that have been made from within the UK, by Region over 2011.

Action Fraud: satisfaction 91% Satisfied with the service received at the contact centre 79% Feel they are better equipped to prevent themselves being a victim of fraud as a result of the contact they had with action fraud

Prevent: web support Single point of information for fraud News alerts 45,630 Visits Linking to partners Victim support DirectGov OFT Consumer Direct Crimestoppers

Prevent: prevention advice Fraud factsheet fulfilment Specific fraud type advice How to spot the fraud Identify the signs Protect yourself

Future: alerts Action Fraud Alerts In collaboration with CoLP, SOCA, Industry, NFIB Working with industry including major banks

Future: Action Fraud update Sent to all AF contacts who have opted into the service Quarterly Themed around a fraud type Has targeted articles Issue 1: Online & Auction Fraud

Internet security Apply patches Run antivirus and firewalls Passwords Be careful about e mail! Clicking on links Opening attachments Supplying details Check urls

Contact us Steve Proffitt Deputy Head of Action Fraud