{"id":242,"date":"2020-06-12T05:00:56","date_gmt":"2020-06-12T04:00:56","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=242"},"modified":"2020-06-12T05:00:56","modified_gmt":"2020-06-12T04:00:56","slug":"what-is-an-online-fraud-investigation","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/what-is-an-online-fraud-investigation\/","title":{"rendered":"What is an Online Fraud Investigation?"},"content":{"rendered":"\n<p>Online fraud is rampant these days. Both a costly and dangerous phenomenon, it can take many forms, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Data breaches\u2014When personal or financial information is stolen from a secure location<\/li><li>Phishing\u2014The utilization of fake emails or websites to steal personal information<\/li><li>Credit card fraud\u2014When scammers steal your credit or bank card numbers<\/li><li>Malware\u2014Dangerous software that is inadvertently downloaded by a user, or planted on a network by an adversary, to disable a system<\/li><\/ul>\n\n\n\n<p>Online fraud doesn\u2019t have a set \u2018type\u2019\u2014it affects government organizations, global businesses, small companies, and your personal friends. Malicious actors defraud millions of people each and every year through the internet. That\u2019s why it\u2019s not only important to recognize the signs of online fraud, but to also know how, as an organization or consumer, you can take care of it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">It\u2019s time to investigate<\/h2>\n\n\n\n<p>It\u2019s important to note that every online activity\u2014malicious or not\u2014leaves a trail of evidence. But just because the path may be hard to find, doesn\u2019t mean that you can\u2019t track down the activity. Through proper online fraud investigation, all online activity can be traced, following those evidence right to the source.<\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online fraud is rampant these days. Both a costly and dangerous phenomenon, it can take many forms, including: Data breaches\u2014When personal or financial information is stolen from a secure location Phishing\u2014The utilization of fake emails or websites to steal personal information Credit card fraud\u2014When scammers steal your credit or bank card numbers Malware\u2014Dangerous software that &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/what-is-an-online-fraud-investigation\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;What is an Online Fraud Investigation?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[16,15],"tags":[],"class_list":["post-242","post","type-post","status-publish","format-standard","hentry","category-cyber-crime","category-digital-forensics"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=242"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/242\/revisions"}],"predecessor-version":[{"id":243,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/242\/revisions\/243"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}