Cyber Crime

The Regional Cyber Crime Unit lead proactive and reactive investigations into cyber dependent crimes affecting organisations across the South West. We also help organisations of all sizes and sectors become more cyber resilient, deliver exercises to test an organisation’s preparedness in the event of a cyber incident, and divert young people away from engaging in cyber crime.

If you are concerned that you have been a victim of cyber crime, please report it to Action Fraud on 0300 123 2040, or contact them online at    

Action Fraud operates a 24/7 phone line for organisations experiencing a live cyber attack, enabling you to get immediate help and advice from fraud and cyber crime specialists.

If you have received an email which you’re not quite sure about, forward it to the NCSC’s Suspicious Email Reporting Service (SERS) at

More information on the SERS can be found at

Investigating cyber crime

We lead our own proactive and reactive investigations into cyber dependent crimes. Our team also coordinate and support cases involving the local constabularies, and support nationally led investigations from the National Crime Agency (NCA).

As cyber crime has no geographical boundaries, we work closely with international law enforcement partners to disrupt organised criminal groups committing cyber offences.

We strongly encourage all victims of cyber crime to report to Action Fraud. Reporting not only provides vital intelligence that aids investigations, but it also informs campaigns which can help prevent others becoming victims of cyber crime.

Protecting Organisations

An integral part of our work lies in providing free and impartial cyber security advice, guidance and resources to organisations of all sizes and sectors. Our guidance is based on the very latest threat intelligence from the National Cyber Security Centre (NCSC) as well as our own investigations.


Below are a few fantastic resources aimed at improving your organisation’s cyber security. The NCSC website is the central point of information regarding cyber security for the UK, and houses a vast number of resources for both businesses and individuals. Other resources are also listed on our SWRCCU Summary Leaflet below.

Sign up to our Fortnightly Regional Cyber Briefing, and follow us on social media for the latest cyber security threats, advice, events, and resources.


We deliver a range of services, including basic cyber security awareness sessions, interactive workshops for ‘non-technical’ senior decision-makers, and technical exercises focused on incident response and recovery. 

If you are interested in engaging with our Protect team, please email

Cyber Choices

According to a recent National Crime Agency (NCA) study, the average age of a convicted cyber criminal is just 17 years old. We have a passionate team whose aim is to divert primarily young and gifted individuals away from committing cyber-crime to lawful, productive and lucrative pathways.

Under the NCA’s Cyber Choices initiative, we engage closely with hundreds of schools and partner agencies, and run bespoke interactive sessions across the South West.

You can contact our Cyber Choices team by emailing

For more information about the Cyber Choices network, please visit the National Crime Agency (NCA) website at


  • Remote Working: Technical, Procedural, and Physical Security Controls 21st June 2019 Remote working can have significant benefits to an organization, however there are numerous cyber security implications that need to be carefully managed.
  • ‘Cross-site Scripting’: An Overview 14th June 2019 With more and more companies relying on third party software solutions, cross-site scripting is becoming an ever increasing threat. Here we give a quick overview of what you should know.
  • Phishing, why don’t you #MulletOver? 7th June 2019 On the back of National Fish and Chip Day, we look at why phishing is such a big issue facing organisations and individuals.
  • ‘Crypters’: An Overview 18th May 2019 The majority of malicious software used in cyber attacks are utilising crypters in some fashion to make them more effective - here we give an overview of what they are, and how they function.
  • Vulnerabilities of IoT Devices 12th April 2019 Now a huge part of enterprise technical infrastructure and embedded into every part of our lives; IoT technology is at a tipping point in terms of security.