This image has an empty alt attribute; its file name is LogoCollection-600x128.png

Vulnerability Notifications

Cyber Officers now make contact with organisations who have been identified as having potential risks with their IT systems as cyber criminals are actively exploiting these vulnerabilities.

If a police officer out on patrol sees a house or car door left open, they would naturally notify the owner as part of conventional crime prevention measures. Notifying organisations of weaknesses in IT is all part of our new digital beat responsibilities.

Detective Sergeant Chris White, South East Regional Cyber Crime Unit

How to verify an Officer’s Identity

Please ensure you select the correct police force from the menu if you are outside of that police force geographical area. The call handler will not know the content of the notification as its sensitive, however, they can verify the officers details. The Officer should have provided their:

  • Pay / Warrant Number
  • Mobile telephone number
  • Email address
  • Cyber Crime Unit for which they work

Genuine police email addresses end in:


The Notification


The Officer will provide you information verbally and by email. You should always ensure emails and attachments have been scanned by antivirus software before opening them. Most companies have systems that do this by default – but check if you are not sure. It is entirely up to you how you act on the information provided.

Delivered Notifications:

Vulnerability Assessments