Cyber & Data Security

Identity Fraud - Easier Than Ever

This article was updated on:
Aug 12th, 2019

Identity Fraud - Easier Than Ever

Identity fraud has been prevalent since the dawn of time, but it’s reached an alarmingly high rate and only seems to be getting worse, but why is this?

Well, the answer to that is pretty simple. Our lives are digital and everything about us in terms of personal information is held on multiple databases for various organisations. Anything from Facebook & Amazon, to the DVLA or Passport office. A data breach can mean our details are stolen and then sold to cyber criminals – date of birth, name, address, credit/debit card details etc etc. It’s a tall order for a hacker to obtain this information and more often than not, the information is encrypted, meaning even if they do get hold of it they can’t read it.

Human Nature: The Weakest Link

Unfortunately though, there are easier ways for them to obtain this data and usually it’s our own human nature that allows us to unwittingly fall into this trap. Whether it’s clicking a seemingly real phishing email, or falling for a telephone scam. Most of us might be sitting there and thinking ‘that will never happen to me, i’m too smart’ and you would be forgiven for thinking this way, but what if they caught you at the right/wrong moment? They rely on our busy agenda’s and trusting nature in order to execute and by the time you realise what’s happening, its too late. Remember, all it takes is one click on a phishing email and that action can’t be reversed without going to extreme lengths.

Social Media Scams in Action

Let’s take social media as another route of activity. There was a recent report of a woman who had her bank account emptied, after sending an innocent tweet, to who she thought was her broadband providers twitter account – it wasn’t and was simply a criminal pretending to be them with a similar name. Long story short, she gave all of her personal information to them online in a matter of minutes and had no idea who she was talking to. The trouble is, we all know that you have to be extra careful these days, but depending on our need for contacting these organisations, we might be vulnerable. This is what they hope for and its what they prey on.

The Rise of “Smishing”

‘Smishing’ is a common modern day type of identity fraud attack at the moment and it simply stands for ‘SMS Phishing’. Its surprisingly easy for someone to mimic an organisation/person and there are websites/tools freely available on the internet that can allow this particular activity to happen. They top up a call/text credit bank, this might be £10 worth for example, enter the name and number they want to be represented as (very important part of the scam) and then the number they want to contact. The most vicious use of this attack is most probably where they pretend to be your bank. You’ll get a text message that physically says it’s from <your banks name> and it will have a link to click, or you might need to reply to it with sensitive information. This might sound basic to many people but its surprisingly effective when sent out to thousands of numbers at once and they know statistically a certain percentage will likely fall into the trap.

How Criminals Gain the Upper Hand

This type of scam becomes even more effective if they know something about you that’s of use to them. Let’s say for example they know your partners mobile number through having obtained both of your details from a list… this is the number they would tell the system to represent and then send a message to you as normal. When that message lands your end, the phone will think it’s actually from your partner and even place the message into an existing conversation thread you have with them! Suddenly they have vast amounts of power, because you don’t stop to question it.

Vigilance is Key

There are so many ways that criminals can obtain our personal details, we just simply have to stay alert and vigilant. It’s not just business owners or heads of department that need to be aware though, our staff are equally – if not more important.

Build Your Human Firewall

Business owners, heads of department and staff are the ‘human firewall’ to your organisation and the first line of defence, so regular training and awareness sessions are crucial to protecting your business.

Keen to learn more? Explore our other related resources below:
December 13, 2025
Password ‘Sextortion’ and Ransomware
Cyber & Data Security
July 1, 2025
How Might Hackers Exploit My Cyber Security? 7 Tricks Small Business Owners Need-To-Know!
Cyber & Data Security
May 1, 2025
MFA Isn’t Optional Anymore: Here’s Why
Cyber & Data Security
IT Management, Policies & Certifications
April 1, 2025
Why Digital Offboarding Needs to Be on Your Radar!
Cyber & Data Security
February 12, 2025
Upgrading to Windows 11: It’s ESSENTIAL, Let us explain why!
Cyber & Data Security
February 1, 2025
11 Simple Steps to Keep Your Microsoft 365 Data Safe
Cyber & Data Security
Microsoft 365
May 23, 2022
The 5 Benefits of Outsourcing IT Support
IT Management, Policies & Certifications
Cyber & Data Security
May 12, 2021
Cyber Essentials Toolkit
Cyber & Data Security
April 19, 2021
Why your Business needs Microsoft 365 Backup
IT Management, Policies & Certifications
Cyber & Data Security
March 4, 2021
Is Microsoft 365 Secure? Our 5 Essential Tips to Stay Safe
Microsoft 365
Cyber & Data Security
February 1, 2021
Free Cyber Security Awareness Training!
Cyber & Data Security
December 20, 2020
Why Do Businesses Only Care About Cyber Security Once They Get Hacked?
Cyber & Data Security
October 17, 2019
Ransomware – Should You Be Worried? 
Cyber & Data Security
March 28, 2019
Invoice Diversion Scenario
Cyber & Data Security
March 26, 2019
Phishing/Ransom Attack Scenario, What Would You Do?
Cyber & Data Security
March 13, 2019
The difference between Cyber Essentials and Cyber Essentials PLUS
Cyber & Data Security
December 4, 2018
What is the Difference Between Penetration Testing and Vulnerability Scanning?
IT Management, Policies & Certifications
Cyber & Data Security
November 28, 2018
How Secure is My Password?
Cyber & Data Security
November 2, 2018
How much help do I need to get Cyber Essentials Certified?
Cyber & Data Security
October 23, 2018
What is an SSL certificate and why do I need one?
IT Management, Policies & Certifications
Cyber & Data Security
October 3, 2018
Defining the Scope for Cyber Essentials
Cyber & Data Security
October 1, 2018
Is it time to switch your IT partner?
Cyber & Data Security
October 1, 2018
The Facebook Breach: This is What You Need to do NOW...
Cyber & Data Security
September 20, 2018
Email Spoofing Scenario
IT Management, Policies & Certifications
Cyber & Data Security
August 24, 2018
What is OneDrive and why should my business be using it? 
Telecoms & Connectivity
Cyber & Data Security
August 20, 2018
What is GDPR?
Cyber & Data Security
August 15, 2018
Server VS Cloud - Which is best for your business?
Telecoms & Connectivity
Cyber & Data Security
August 14, 2018
Why Should I get my business Cyber Essentials certified?
Cyber & Data Security
August 14, 2018
How Much Does Outsourced IT Support Cost in 2023?
IT Management, Policies & Certifications
Cyber & Data Security
May 1, 2018
The Difference between NCSC Small Business Guide & Cyber Essentials
Cyber & Data Security
December 2, 2017
Cyber Essentials Certification: Everything You Need to Know
Cyber & Data Security
January 22, 2009
Are there any substitutes to ISO 27001 suitable for my business?
Cyber & Data Security
IT Management, Policies & Certifications