Phone us
Recent discussions on BBC Morning Live with consumer expert Nick Stapleton have highlighted a concerning rise in everyday fraud tactics affecting ordinary individuals across the UK. 

From email hacking and spoofing to cold calls about compensation claims, these cases illustrate how fraudsters are refining their methods by leveraging personal data, social engineering, and psychological manipulation. 

At AJC, we believe awareness and education is the first line of defence. Below, we break down the key risks and outline the practical steps that can be taken. 

Email Hacking and Spoofing: A Growing Threat 

One viewer reported that scammers were sending emails from her address asking contacts for money. Situations like this typically fall into two categories:

1. Account compromise – where criminals gain full access to an email account.

2. Email spoofing – where messages are made to appear as though they come from a legitimate address without direct access to the account.

3. Lookalike domains – where a fraudster changes a single character in the email address to deceive recipients.

Immediate Protective Steps:

If you suspect email compromise: 

  • Reset your password immediately 
  • Change passwords on any other accounts using the same credentials 
  • Enable two-factor authentication 
  • Check sent messages and inbox rules for suspicious forwarding 
  • Remove unknown third-party apps connected to your account 
  • Run a malware scan on your devices 
  • Keep software updated 

Suspicious phishing emails can be reported via report@phishing.gov.uk.  

From a fraud prevention perspective, multi-factor authentication remains one of the most effective barriers against account takeover. 

Cold Calls About Car Finance Refunds 

Another viewer received a call claiming compensation for mis-sold car finance. The caller quoted a previous address and requested updated details. 

This tactic illustrates how fraudsters use information from historic data breaches or illicit databases to build credibility. The objective is often not immediate financial theft, but data harvesting. Updated details can be used in future scams or sold onward. 

What To Do If You Receive a Suspicious Call 
  • End the call if you feel uncomfortable 
  • Do not provide additional personal information 
  • Monitor bank accounts for unusual activity 
  • Check your credit report for unexpected changes 
  • Consider protective registration with Cifas if identity misuse is suspected 

Protective registration can add additional verification checks when credit applications are made in your name, reducing the likelihood of fraudulent borrowing. 

Key Lessons from These Cases 

Across all these scenarios, the consistent themes are: 

  • Fraudsters exploit trust and familiarity 
  • Personal data is currency 
  • Pressure and urgency are common manipulation tools 
  • Simple security controls significantly reduce risk 

At AJC, we encourage individuals and organisations to treat personal data as a critical asset. Strong password hygiene, authentication controls and cautious data sharing are no longer optional safeguards. They are essential components of modern fraud resilience. 

How AJC Can Help 

AJC supports organisations with: 

  • Staff awareness training 
  • Incident response guidance 

Fraud continues to evolve. Prevention must evolve faster. 

If you would like to strengthen your fraud controls or deliver targeted awareness training within your organisation, contact AJC today.

Contact us on 020 7101 4861 or email us at info@ajollyconsulting.co.uk if you think we can help.


Sources:

https://www.bbc.co.uk/articles/cx24ld241njo  

Image accreditation: Graficon Stuff (Sept 2024) from Unplash.com+. Last accessed on 11 March 2026. Available at: https://unsplash.com/illustrations/a-hand-holding-a-smart-phone-with-a-wallet-attached-to-it-DrI91hEpyDc

In case you missed it...

GDPR’s 72 Hour Rule Explained
GDPR’s 72 Hour Rule Explained: Why...

The GDPR requirement to report certain personal data breaches within 72 hours is one of the most widely cited obligations...

Read More
DUAA ICO Guidance
Navigating the DUAA: ICO Guidance and...

The Data (Use and Access) Act 2025 is being introduced in stages, with ICO guidance continuing to evolve alongside it....

Read More
virtual phones fraud
The Growing Fraud Risk Around Virtual...

As fraud tactics continue to evolve, organisations are being forced to rethink security measures that were once seen as standard....

Read More

Get in touch

    By submitting this form you are consenting that your data be handled in accordance with our Privacy Notice and we will be in touch regarding your enquiry.