博鱼体育集团

Find a property
Find a property
Find a property

From modern apartments to character country houses, start the journey to your dream home.

Sell or let
Sell or let
Sell or let

As local experts with global reach, we’ll help you find the right buyer or tenant for your property.

Services
Services
Services

We offer a full range of property-related services. From financing to interiors, we’ve got you covered.

People & offices
People & offices
People & offices

Our team of more than 27,000 people operates across 740 offices in over 50 territories around the globe.

Insights
Insights
Insights

Delve into our publications and reports for lifestyle trends and on-the-pulse market knowledge.

Protection against fraud

Protection against fraud

We take safeguarding against fraud seriously.

We鈥檒l help you arm yourself with information to prevent the theft of personal details and money through fraudulent interactions.

Fraud often takes place through social engineering. Social engineering is a fraud technique that persuades people to divulge personal information or covertly gain information that can be used to provide access to confidential details beneficial to the fraudster.

We want to make sure our customers are as secure as they can be. If you鈥檙e concerned you might be subject to fraud, please contact us.

Social engineering fraud

How does social engineering work?

  • House buyers and sellers, landlords and tenants are transacting significant sums of money and are targets for fraudsters.
  • Social engineering can be used by email (phishing), telephone (vishing), text (smishing) or in person.
  • Fraudsters often pretend to be someone with the authority to know the information they鈥檙e trying to find out, which can lull you into a false sense of security.

How to spot social engineering attempts

  • You may receive an email from someone pretending to be a client or supplier requesting a payment be made to a different bank account.
  • You could receive a link from a fraudster taking you to a login page that gathers your username and password.
  • You could receive an email from an apparent senior member of staff asking for a payment to be made or for something to be purchased.
  • You might receive a call apparently from your bank, asking for account verification information. Real banks will never request your personal information over the phone without being contacted by you first.
  • For a physical example, you could be tailgated into a secure building or area and confronted in person.

How to protect against social engineering schemes

Ensure secure payment processes

It鈥檚 important to have a policy and process in place to ensure payments are made to genuine recipients. These guidelines help eliminate risks.

  • Only make payments using bank account details on file.
  • Never update bank account details for a recipient without checking with them verbally. Call them back on a number you have on record for them (not the number in an email requesting a change).
  • Ensure payment approval processes are in place. The person raising the payment should not authorise the payment.
  • Always double check everything. If anything seems at all suspicious, don鈥檛 do it.

Adapt your behaviour

  • It鈥檚 better to be overly suspicious than careless. If it sounds too good to be true, it probably is.
  • Employ your sleuth skills 鈥� check the writing style, language, grammar, and punctuation. If an email seems out of character, speak to the sender in person.
  • Don鈥檛 click on a link if you don鈥檛 know the sender. Check the web address is going where it claims to be going, and doesn鈥檛 look suspicious, for example a long line of symbols and numbers.
  • Always check the email address thoroughly. Sometimes they can be hidden. If the email address doesn鈥檛 match the name or the domain sounds strange, it鈥檚 likely to be a phishing scam.

How we help to protect you

We help to protect you by following these simple guidelines.

  • We don鈥檛 share confidential details with other people and protect any personal and financial data you share with us.
  • We protect documents that could be useful to fraudsters. For example, copies of bank statements and passports are often used as proof of identity, so we don鈥檛 let anyone have access to them if they don't need to.
  • If we don鈥檛 need it, we don鈥檛 record it. For example, we won鈥檛 record credit card numbers or personal health details.
  • We agree on ways of checking identity with you, and we confirm our identity prior to discussing sensitive information.
Get in touch

Thank you
for getting in touch

A member of our team will be in touch with you as soon as possible to discuss your enquiry.

We look forward to speaking with you soon.

We take the processing and privacy of your information very seriously. Your data is collected and used in accordance with our terms and conditions and global privacy policy.

This site is protected by reCAPTCHA and the Google and apply.

Sorry!
An unexpected error has occurred.

Please try again later.

Sending your message...
Sending your message...