SlideShare a Scribd company logo
1 of 2
Download to read offline
Expert advice from the
specialist Bridge team
Crime & Fraud Insurance AIG’s Crime Solution
Standard Cover Includes:
- Employee Fraud discovered
during the Policy Period
- Third Party Fraud discovered
during the Policy Period
- Sub Limit for Professional
Investigation Services to
quantify a potential loss
- Broad Cover for New Subsidiaries
(unless US listed or US based)
- No Aggregate Limits
- No “System of Check” requirement
like other insurers. If a loss is due
to an unintentional failure of a
control procedure, the claim will
still be paid.
- Fraud Investigation Costs
The United Kingdom is seeing a huge rise in cybercrime some of which could
genuinely see a company collapse. PwC recently reported that the threat of
cyber offences was now a board-level issue yet it was still not being taken
seriously enough by the majority of companies.
Approximately 55% of UK Firms have fallen victim to some form of economic
crime in the last 2 years and cybercrime is the fastest growing area rising from
20% to nearly 50% of all economic crime in that time.
The majority of firms do not have any plans in place to fend off cybercrime which
is why Bridge Insurance Brokers has negotiated access with online risk
management specialist Cyber AMI to offer its clients 30 days free access to Cyber
AMI’s risk management portal.
Via the risk management portal, our clients can assess their own exposure and
put in place policies to reduce legal liabilities, improve security and protect their
brand, whilst accessing education modules that will assist with completion of
the UK Government’s Cyber Essentials Scheme.
Risk Management is only the beginning though and if companies have
procedures in place and still suffer an economic crime loss then crime insurance
is designed to pick up those losses whether perpetrated by someone on the
inside or by a third party.
Whilst it can be hard to accept that your own staff might be stealing from you,
unfortunately the truth is that it may be the most trusted and senior staff who
have the knowledge to skirt round security and set up well concealed fraudulent
systems. Third Party fraud is also on the increase with sophisticated criminals
using advanced methods of fraudulent activity to steal from your business.
Get In Touch
John Batty
Bridge Insurance Brokers Limited registered in England No. 996284.
Member of the British Insurance Brokers Association. Authorised & regulated by the
Financial Conduct Authority in respect of insurance mediation activities. 05/15
Manchester:
Cobac House, 14-16 Charlotte Street
Manchester, M1 4FL
T: +44 (0) 161 236 6969
London:
One Aldgate, London EC3N 1RE
T: +44 (0) 203 102 4300
www.bridgeinsurance.co.uk
Bridge Specialist Risks.indd 2 18/05/2015 16:45
john.batty@bridgeinsurance.co.uk
0161 234 9357
Mem ersh
Fake President Fraud
Currently the most favourite fraud of the criminal fraternity, usually targeting
finance managers, account payable clerks and other employees responsible for
bank transfers. It involves impersonation of a high ranking company official, for
example a Chairman or Managing Director with sufficient authority to request or
approved an urgent financial transaction and persuading the employee to carry
out the transfer under the pretext of an acquisition, deposits or debts.
Invoice Fraud
Another popular scam is where an email is received from what appears to be a
genuine supplier informing the company of a change in back account details and
the IT systems are updated automatically, then when the genuine invoice comes in
from the supplier it is paid to the criminal’s bank account. Normally the fraud isn’t
discovered until the supplier calls to state they haven’t received payment which
could be 2 or 3 invoices down the line and far too late to recover anything.
Hacking
Now a traditional form of fraud whereby criminals exploit weaknesses in your IT
infrastructure to access computers and ultimately software programs to transfer
money from your online banking into their own accounts.
Phishing
Is an attempt by criminals to acquire sensitive information such as usernames and
passwords often masquerading as a trusted entity in emails with a view to
accessing bank accounts to transfer monies to their own account.
Malware
Is intrusive software normally delivered as an email attachment in the form of
worms, Trojan horses, ransomware, spyware, adware and key stroke logging. It can
sit on your computers without your knowledge gathering information and before
you know it bank account information such as user id’s, passwords and security
answers are in the hands of the criminals.
Telephone Scams
Not all third party fraud is committed online however and we have seen examples
whereby employees are tricked into transferring thousands of pounds in
telephone scams by individuals pretending to be from the company’s bank or
finance providers.
Fake Delivery
We have also seen circumstances whereby third party criminals accept delivery of
goods at the entrance to a company’s premises and disappear without the
company even knowing until which time the suppliers are chasing payment.
All these examples of Crime and
Fraud would be covered by the
AIG Crime Policy as long as
Company Procedures were in
place and just not followed by
individuals.

More Related Content

What's hot

10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet FraudGoose & Gander
 
TMI CYBER INSURANCE BROCHURE
TMI CYBER INSURANCE BROCHURETMI CYBER INSURANCE BROCHURE
TMI CYBER INSURANCE BROCHUREShan Budesha
 
Prevent banking frauds through identity management
Prevent banking frauds through identity managementPrevent banking frauds through identity management
Prevent banking frauds through identity managementGARL
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharmingDawn Hicks
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017N F
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Merchants
 
How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac JackMathew4
 
Alternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slidesAlternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slidesCallcredit123
 
Digital identification in the Gambling industry
Digital identification in the Gambling industryDigital identification in the Gambling industry
Digital identification in the Gambling industryDominicvanBergen
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudMichael Holden
 
Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In EcommerceLarry_Moffatt
 

What's hot (20)

IRS scams continue to pose serious threat
IRS scams continue to pose serious threatIRS scams continue to pose serious threat
IRS scams continue to pose serious threat
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
TMI CYBER INSURANCE BROCHURE
TMI CYBER INSURANCE BROCHURETMI CYBER INSURANCE BROCHURE
TMI CYBER INSURANCE BROCHURE
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
 
Five Tax Scams to Avoid
Five Tax Scams to AvoidFive Tax Scams to Avoid
Five Tax Scams to Avoid
 
Prevent banking frauds through identity management
Prevent banking frauds through identity managementPrevent banking frauds through identity management
Prevent banking frauds through identity management
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers Presentation
 
Fraud management optimisation
Fraud management optimisation Fraud management optimisation
Fraud management optimisation
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac
 
Alternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slidesAlternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slides
 
Digital identification in the Gambling industry
Digital identification in the Gambling industryDigital identification in the Gambling industry
Digital identification in the Gambling industry
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire Fraud
 
eCommerce – Fraud
eCommerce – FraudeCommerce – Fraud
eCommerce – Fraud
 
Internet fraud
Internet fraudInternet fraud
Internet fraud
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In Ecommerce
 

Similar to Bridge Cyber Crime_March_JB

Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesShred Station
 
Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017Kieren Windsor
 
Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017Gary Chambers
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINALChris Evans
 
Vp financial-fraud-report-digiversion
Vp financial-fraud-report-digiversionVp financial-fraud-report-digiversion
Vp financial-fraud-report-digiversionValue Partners
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfssuser7464571
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charitiesBlake Morgan LLP
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...Executive Leaders Network
 
Insurance for the Electronic Payments sector
Insurance for the Electronic Payments sectorInsurance for the Electronic Payments sector
Insurance for the Electronic Payments sectorJo Kennedy
 
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfHow to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfBhekumuzi Xaba
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...Mahmoud Elmekawy
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar SessionKalilur Rahman
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxNavinKumarDewangan
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019ImekDesign
 
Social Engineering Flyer.pdf- chatter
Social Engineering Flyer.pdf- chatterSocial Engineering Flyer.pdf- chatter
Social Engineering Flyer.pdf- chatterEleni Petros
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Narayan Makaram
 

Similar to Bridge Cyber Crime_March_JB (20)

Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for Businesses
 
Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 
Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINAL
 
Vp financial-fraud-report-digiversion
Vp financial-fraud-report-digiversionVp financial-fraud-report-digiversion
Vp financial-fraud-report-digiversion
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdf
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
 
Insurance for the Electronic Payments sector
Insurance for the Electronic Payments sectorInsurance for the Electronic Payments sector
Insurance for the Electronic Payments sector
 
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfHow to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019
 
Social Engineering Flyer.pdf- chatter
Social Engineering Flyer.pdf- chatterSocial Engineering Flyer.pdf- chatter
Social Engineering Flyer.pdf- chatter
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
 

Bridge Cyber Crime_March_JB

  • 1. Expert advice from the specialist Bridge team Crime & Fraud Insurance AIG’s Crime Solution Standard Cover Includes: - Employee Fraud discovered during the Policy Period - Third Party Fraud discovered during the Policy Period - Sub Limit for Professional Investigation Services to quantify a potential loss - Broad Cover for New Subsidiaries (unless US listed or US based) - No Aggregate Limits - No “System of Check” requirement like other insurers. If a loss is due to an unintentional failure of a control procedure, the claim will still be paid. - Fraud Investigation Costs The United Kingdom is seeing a huge rise in cybercrime some of which could genuinely see a company collapse. PwC recently reported that the threat of cyber offences was now a board-level issue yet it was still not being taken seriously enough by the majority of companies. Approximately 55% of UK Firms have fallen victim to some form of economic crime in the last 2 years and cybercrime is the fastest growing area rising from 20% to nearly 50% of all economic crime in that time. The majority of firms do not have any plans in place to fend off cybercrime which is why Bridge Insurance Brokers has negotiated access with online risk management specialist Cyber AMI to offer its clients 30 days free access to Cyber AMI’s risk management portal. Via the risk management portal, our clients can assess their own exposure and put in place policies to reduce legal liabilities, improve security and protect their brand, whilst accessing education modules that will assist with completion of the UK Government’s Cyber Essentials Scheme. Risk Management is only the beginning though and if companies have procedures in place and still suffer an economic crime loss then crime insurance is designed to pick up those losses whether perpetrated by someone on the inside or by a third party. Whilst it can be hard to accept that your own staff might be stealing from you, unfortunately the truth is that it may be the most trusted and senior staff who have the knowledge to skirt round security and set up well concealed fraudulent systems. Third Party fraud is also on the increase with sophisticated criminals using advanced methods of fraudulent activity to steal from your business.
  • 2. Get In Touch John Batty Bridge Insurance Brokers Limited registered in England No. 996284. Member of the British Insurance Brokers Association. Authorised & regulated by the Financial Conduct Authority in respect of insurance mediation activities. 05/15 Manchester: Cobac House, 14-16 Charlotte Street Manchester, M1 4FL T: +44 (0) 161 236 6969 London: One Aldgate, London EC3N 1RE T: +44 (0) 203 102 4300 www.bridgeinsurance.co.uk Bridge Specialist Risks.indd 2 18/05/2015 16:45 john.batty@bridgeinsurance.co.uk 0161 234 9357 Mem ersh Fake President Fraud Currently the most favourite fraud of the criminal fraternity, usually targeting finance managers, account payable clerks and other employees responsible for bank transfers. It involves impersonation of a high ranking company official, for example a Chairman or Managing Director with sufficient authority to request or approved an urgent financial transaction and persuading the employee to carry out the transfer under the pretext of an acquisition, deposits or debts. Invoice Fraud Another popular scam is where an email is received from what appears to be a genuine supplier informing the company of a change in back account details and the IT systems are updated automatically, then when the genuine invoice comes in from the supplier it is paid to the criminal’s bank account. Normally the fraud isn’t discovered until the supplier calls to state they haven’t received payment which could be 2 or 3 invoices down the line and far too late to recover anything. Hacking Now a traditional form of fraud whereby criminals exploit weaknesses in your IT infrastructure to access computers and ultimately software programs to transfer money from your online banking into their own accounts. Phishing Is an attempt by criminals to acquire sensitive information such as usernames and passwords often masquerading as a trusted entity in emails with a view to accessing bank accounts to transfer monies to their own account. Malware Is intrusive software normally delivered as an email attachment in the form of worms, Trojan horses, ransomware, spyware, adware and key stroke logging. It can sit on your computers without your knowledge gathering information and before you know it bank account information such as user id’s, passwords and security answers are in the hands of the criminals. Telephone Scams Not all third party fraud is committed online however and we have seen examples whereby employees are tricked into transferring thousands of pounds in telephone scams by individuals pretending to be from the company’s bank or finance providers. Fake Delivery We have also seen circumstances whereby third party criminals accept delivery of goods at the entrance to a company’s premises and disappear without the company even knowing until which time the suppliers are chasing payment. All these examples of Crime and Fraud would be covered by the AIG Crime Policy as long as Company Procedures were in place and just not followed by individuals.