West Yorkshire Police

For non-emergencies dial 101 - In an emergency always dial 999

Cyber Crime

 

Randsomware Incident - Friday 12th May 2017 - NHS

Guidance information:
Randsomware Incident

Randsomware Incident (PDF)

 

 

Yorkshire and Humber Cyber Protect Conference


Yorkshire and Humber Cyber Protect Conference - 28th February 2017 - Leeds

Live Video Feed


DCI Vanessa Smith, of the Regional Cyber Unit, talks about the first Yorkshire and Humber Cyber Protect Business Conference in Leeds next Tuesday, February 28, organised to help businesses protect themselves against cyber crime.

 

DCI Vanessa Smith - Facebook Live

DCI Vanessa Smith will be appearing on Facebook LIVE on the last Thursday of the month, usually at 12pm, talking about Cyber Crime. Check social media for the latest scheduled event.

Click the image below to view.
DCI Vanessa Smith - Facebook Live

You're more at risk of identity fraud than you think. Sharing personal details like your date of birth, address and phone number can make you vulnerable. Don't make it easy for identity fraudsters. Start by setting your privacy settings. - www.identityfraud.org.uk

 

NSPCC - Play Like Share

The NSPCC have a resource  - Play Like Share

This three-episode animated series and accompanying resource pack aims to help eight-to-ten year olds learn how to stay safe from sexual abuse, exploitation and other risks they might encounter online such as sharing content. Follow the link above to find out more.

 

Cyber Crime Awareness Campaign Launched

 

Cyber Crime Victim Conned out of £14,000 Police Video Interview

 

 

Block The Web Monsters

 Web Monsters - InvadersBe careful with your password and pin! Web Monsters - Web 

  

The Force, which is only one of a handful across the country with a dedicated cyber unit, is looking to spread the word about the dangers of the crime and the devastating impact it can have on people’s lives.

DI Vanessa Smith - West Yorkshire Cyber Crime Unit

The computer is rapidly becoming the new crowbar and anyone who has a desktop computer, laptop, tablet or mobile device/phone could be at risk of being a victim". 

 

Block The Web Monsters


Page Index

Crime Prevention Advice Videos
Looking for quick tips? See our latest video messages by Force Crime Prevention Officer Chris Joyce.

 

Crime Prevention Videos


Guarding again online crime can be simple!   West Yorkshire Police crime prevention expert Chris Joyce talks about crime prevention techniques in his latest video updates as part of the Force’s Block The Web Monsters cyber crime campaign. 


Crime Facebook Live Videos


To re-watch any of the cyber crime Facebook live videos that we have hosted, please follow this link.



Posters / Images / Downloads

Block The  Web Monsters - Spider - POSTER Block The  Web Monsters - Octopus - POSTER Block The  Web Monsters - Roach - POSTER
Spider Poster 1 PDFOctopus Poster 1 PDFRoach Poster 1 PDF
   
Don't let people take you in!Be careful with your password and pin!Don't open spam, You lose, they win!
Spider Poster 2 PDFOctopus Poster 2 PDFRoach Poster 2 PDF
   
Web Monsters - WebWeb Monsters - Invaders 
Web Monsters - Web (PDF)Web Monsters - Invaders (PDF) 

    


Cyber bullying
 

Online bullying or "cyber bullying" is the use of electronic media, especially a mobile phone, tablet or home computer to intimidate, threaten or upset someone. Cyber bullying, like bullying in schools, the street or at home causes the recipient misery and upset.

Research suggests that cyber bullying is most common among teenagers - with at least one in five having been a victim of it.

  • Texting, posting or emailing anything that deliberately offends someone is cyber bullying - think before you post / tweet / press send.
  • Cyber bullying can take place on social media, via mobile phones and tablets through apps and texts - and in online games.
  • If you are a victim of cyber bullying take screen shots of the posts and talk to someone you trust.
  • Cyber bullying should be reported to the police on 101 or online: https://www.westyorkshire.police.uk/ClickB4UCall
  • If cyber bullying occurs thorugh a social networking site / app report incidents to the site / app in question.
  • If you or your child is a victim of cyberbullying encourage them to block or delete the bully and report it to the website in question.
  • There is lots of help and support online if you are a victim of cyber bullying. Please see links below.

Useful links

 


Advice for BusinessesBlock The Web Monsters - roach

Businesses can be just as susceptible to cyber crime as individuals  -  keep yourself and your business safe online. Many small and medium sized businesses underestimate the threat cyber crime poses to their business.

10 steps to cyber security

Step 1 - Define a Regime
Defining and communicating your Board's Information Risk Management Regime is central to your organisation's overall cyber security strategy.

Step 2 - User Education and Awareness
Produce user security policies covering acceptable and secure use of the organisation's systems. Establish a staff training programme. Maintain user awareness of the cyber risks.

Step 3 - Home and Mobile Working
Develop a mobile working policy and train staff to adhere to it. Apply the secure baseline build to all devices. Protect data both in transit and at rest.

Step 4 - Secure Configuration
Apply security patches and ensure that the secure configuration of all ICT systems is maintained. Create a system inventory and define a baseline build for all ICT devices.

Step 5 - Removable Media Controls
Produce a policy to control all access to removable media. Limit media types and use. Scan all media for malware before importing on to the corporate system.

Step 6 - Manage User Privileges
Establish account management processes and limit the number of privileged accounts. Limit user privileges and monitor user activity. Control access to activity and audit logs.

Step 7 - Incident Management
Establish an incident response and distaster recover capability. Produce and test incident management plans. Provide specialist training to the incident managemtnt team. Report criminal incidents to law enforcement.

Step 8 - Monitoring
Establish a monitoring strategy and produce supporting policies. Continuously monitor all ICT systems and networks. Analyse logs for unusual activity that could indicate an attack.

Step 9 - Malware Protection
Produce relevant policy and establish anti-malware defences that are applicatble and relevant to all business areas. Scan for malware across the organisation.

Step 10 - Network Security
Protect your networks against external and internal attacks. Manage the network perimeter. Filter out unauthorised access and malicious content. Monitor and test security controls.

 

Cyber Information Sharing Partnerships (CISP) for business

“The Cyber-security Information Sharing Partnership is a Government funded and managed portal helping organisations to have access to the latest threats and attacks so that they can protect themselves. The CISP receives inputs from a range of National Agencies and is available to organisations whether public private or charitable. The CISP lists details of a range of attacks as diverse as schools, health service and email scams.

It is s free service and will not spam members.

To join simply go to www.ncsc.gov.uk/cisp

Each region has its own section and locally those joining the CISP are invited to link to the Yorkshire Humberside group. Local business aql are the business ambassadors for the Regional CISP”

 

Useful Links

Ransomware
Get safe online - Ransomware campaign
Get Safe Online has today issued a warning to the general public and small businesses to avoid becoming a victim of ransomware, as the UK remains one of the most affected countries in the world.

Protect yourself and your device from ransomware:

  1. Get Safe Online has shared the following top tips for protecting yourself from ransomware:
  2. Don’t click on any links or attachments in emails you receive from an unsolicited sender, or even one that appears to come from someone you know, but seems irregular (somebody may have hacked or spoofed their email).
  3. Always install software updates as soon as you are prompted, as these often include fixes for security vulnerabilities. Do this for your operating system as well as any software programs and mobile apps.
  4. Visit only websites you know to be reputable.
  5. Install anti-virus software on your computer and mobile devices (including Apple), making sure to keep it updated.
  6. Regularly back up your important files. You can do this by using an external hard drive, memory stick or online storage provider, but remember not to leave your backup device connected to your computer as the malware can then spread to there too.
  7. If your computer has been locked by ransomware, you should contact your support provider or the retailer you purchased the device from, for assistance.
  8. If you become a victim of ransomware, report it to Action Fraud immediately.

 

For advice and guidance about protecting your business either before or after a cyber attack please have a look at the attached document

 

Ransomware

 


Child Sexual Exploitation
 

CSE Know The Signs posterChild Sexual Exploitation (CSE) is where someone takes advantage of a child sexually for their own benefit.

Some people use technology to make contact with children and young people with the intention of “grooming” them. To groom someone is to prepare someone to do something sexual for the benefit of the person making contact.

Those who seek to groom children or young people might try to gain their trust by using a fake profile picture and fake personal details and by pretending to have similar interests as them.

People who try to groom children and young people want them to believe their lies so that they can get information about:

  • their age
  • where they live
  • who else might use the computer that they use or
  • who else has access to their mobile phone

If you believe you are a victim, or know someone who is a victim, please contact the Police on 101 or online via: https://www.westyorkshire.police.uk/ClickB4UCall

Below are tips and advice to both parents and children, including knowing the signs that CSE may be happening, or if you are a child who to turn to if you are a victim.

Advice to parents

  • Could you recognise the signs of child sexual exploitation? Our Know The Signs campaign details what to look out for.
    Some of the visible signs may be :
    • Regularly missing from home or school and staying out all night
    • Change in behaviour – becoming aggressive and disruptive or quiet and withdrawn.
    • Unexplained gifts or new possessions such as clothes, jewellery, mobile phones or money that can’t be accounted for.
    • Increase in mobile phone use or secretive use
    • Appearing to be under the influence of drugs or alcohol
    • Being picked up or dropped off in cars by unknown adults
    • A significantly older ‘boyfriend’ or ‘friend’ or lots of new friends
    • Spending excessive amount of time online and becoming increasingly secretive about time spent online
    • Sudden involvement in criminal behaviour or increased offending
    • Sexual health problems
  • Child Sexual Exploitation (CSE) can take place online - on smartphones, tablets and computers. Do you know who your children are talking to online? See our information about keeping young people safe on the web
  • Talking to your children about what they are doing online is one of the best ways to keep them safe.
  • Social media might seem confusing if you don’t use it yourself - our simple guides can help parents keep children safe online
  • Our simple guides explain how to set privacy settings on websites such as Facebook and Twitter and also on games consoles.
  • Sexting: advice for parents - information from the NSPCC, explaining what sexting is, what the risks are, and how to talk to your child about the issues. http://www.nspcc.org.uk/preventing-abuse/keeping-children-safe/sexting
  • View our simple Snapguide below : 'How to keep your kids safe online - a parents guide

 

Advice to young people

  • Some people will use false accounts and fake photos to trick victims of online grooming. Read more with our Who R U Talking 2 campaign
  • If you are worried about online grooming there are people who can help, who won’t blame or judge you – find out more and get help
  • People may not always be who they say they are online. Never accept ‘friend requests’ or give personal information to people you only know online.
  • Ensure your privacy settings on social media accounts are set appropriately, so only people you want to can see your profile.
  • Always keep your passwords and personal information private to stay safe online. Remember people might not be who they say they are. Read more with our Who R U Talking 2 campaign
  • If anyone asks you to do something online that you aren’t comfortable with, such as sending photos or on webcam, you should tell an adult you trust.

Useful Links

 


Online Fraud

Block The Web Monsters - octopus

Online fraud covers a variety of incidents - including online banking, auction websites, identity theft and online shopping to name just a few.  Users often forget that they are not dealing face to face with somone and believe what they see to be true, without reservation, or the sort of caution you might apply in dealing with someone face to face.

Online fraud can be reported to Action Fraud 0300 123 2040 (textphone 0300 123 2050).
http://www.actionfraud.police.uk/contact-us

Stay safe online by taking some simple precautions.

Auction websites

  • Online auctions are popular with shoppers -  when using auction sites always use strong passwords and never give your passwords to anyone
  • When paying on auction sites never transfer the money direct to a bank account, secure sites such as PayPal are usually safer – however payments can be reversed – check the seller's feedback before making a purchase.
  • Always make sure you have received payment for sales on auction sites before you despatch the goods – and when posting, use a fully tracked and signed for postal service.
  • Remember if something appears too good to be true, then it usually is.

Online banking

  • If you use online banking it’s important you keep passwords and personal details private to stop criminals accessing your account
  • Banks will never ask you to reveal your full password on the phone or by email.
  • When using online banking be aware of who can see your screen and make sure you log out properly.

Online shopping

  • Shopping online can often save time and effort but there are risks too. When shopping online make sure the retailer is reputable, research them online and make sure they have an address and phone number.
  • Look out for secure "httpS" links in the address of the website to ensure the site is secure in its payment/form handling methods.
  • Paying online by credit card can offer greater protection than other payment methods.
  • Try to use different passwords for different websites - sharing passwords can be very risky.
  • Fake scam versions of corporate sites may be set up that look almost identical to the original site - yet may be completely fake. Always check the web address of the page and ensure it is the official website.

Phishing Emails

  • Phishing is where an email is sent asking you to log on to your banking website or a shopping website by way a spoof / fake website. This website looks genuine and can be a clone of the genuine site. Once you log on this website then captures your login details and these can be used fraudulently.
  • Always check the web address of the web page you are visiting and ensure it is the official website.
  • Never reply to these emails - you may then be added to a 'suckers' list and receive more emails of a similar kind.
email-spoofing   Computer Services Crime
   
Holiday Fraud Gaming Campaign

Disclaimer: We do not endorse any bank or building society, and are using this video to show crime prevention advice only.

Useful Links


Harassment / Stalking


With the increasing ease of access to the internet, harassment and stalking has become easier for those who carry it out - this makes it easier to do so either as an extension of existing harassment / stalking activities, or purely based online. Unwanted persistent and frequent contact from another individual is highly undesirable and the outcome to either male or female victims ranges from discomfort and annoyance, through to severe distress and mental trauma.

  • Stalking and harassment can take place online or in person and can be extremeley traumatic for victims.
  • Monitoring someone’s internet use, emails, texts or other communication is stalking and this is a criminal offence.
  • If you are worried about stalking or harassment call the national helpline on 0808 802 0300 or police on 101 in an emergency always dial 999.
  • If you are a victim of cyberstalking gather as much evidence as you can and report it to police on 101.
  • If you are a victim of "revenge porn" contact the new Revenge Porn Helpline on 0845 6000 459 - the helpline offers details of free legal advice and signposting to additional support services such as Women's Aid, Stalking helpline or Relate if required. 
  • To protect yourself from cyberstalking keep online personal info to a minimum and regularly change your online passwords.
  • Most social networking sites / apps have a means of reporting harassment / stalking -

Useful links


Links Disclaimer
Please note that by accessing external links you will leave the West Yorkshire Police website. West Yorkshire Police are not responsible for the quality, accuracy or content of external websites.