Introduction and Objectives

Criminals exist in every corner of modern life, and our computers, devices and gadgets are no exception. The prevalence of information technology, and the often-opaque nature of the systems involved, create fertile ground for those trying to steal money and information.

Sometimes the techniques cyberfraudsters use are just old scams dropped into a modern infrastructure. Social engineering, a way of tricking people into disclosing information, is an example. Other crimes are uniquely IT driven, like ransomware which employs sophisticated encryption to leverage blackmail.

This module will highlight some of the ways in which technology is used for fraudulent purposes. Sometimes technology is the target, at times only a tool, but like all types of fraud, the aim is to gain something of value. Whether they are in the form of a specific attack, generic malware, or other techniques, they are all forms of fraud.


The objectives of this module are to:

  1. Review the most common forms of cyberfraud.
  2. Create awareness of the routes that criminals use to infiltrate systems.
  3. Highlight red flags that you should be aware of.
  4. Provide actionable steps you can take to protect yourself and your practice.

Treat this discussion as a basic introduction to cybersecurity. It is a complicated area, and there are countless ways in which systems can be attacked, including many not mentioned here. More significantly, there is a constantly evolving battle between defences and new ways hackers develop to avoid those protections. New strategies evolve literally every day. Unfortunately, one can never consider a cybersecurity strategy as finished. It requires ongoing vigilance, education, and improvement.

Although we aim to present a comprehensive Module, this Module is not exhaustive. This Module is not a substitute for exercising professional judgment and does not constitute legal advice.

Time Estimate for this Module (including Quiz, but not including optional videos): 70 minutes