What to Do If Your Corporate Identity Has Been Stolen
- Neil Hare-Brown

- Jun 12
- 3 min read
If someone is pretending to be your organisation - using your name, branding, address, or registration details to commit fraud - you're dealing with Business Identity Theft (BIT).
While it can feel alarming, there are clear steps you can take to contain the damage, report the fraud, and protect your business from further harm.
Whether you’ve discovered fake invoices, client scams in your name, or suspicious activity on your official records, this guide will help you act fast and effectively.
Step 1: Confirm What’s Been Stolen or Misused
Start by understanding what kind of identity fraud has occurred. Common forms of business identity theft include:
Fake websites or domains impersonating your company
Scammers issuing invoices or payment demands using your name
Fraudulent loan applications or credit lines opened in your business’s name
Company registration changes made without your knowledge (e.g. address, directors)
Misuse of your VAT number, company number, or other official IDs
The more details you can gather, the easier it will be to investigate and report.
Step 2: Notify Affected Parties Immediately
If clients, suppliers, or partners may have received fraudulent communication:
Let them know as soon as possible
Warn them not to respond, click links, or send money
Provide clear contact information for legitimate communication
Offer reassurance and support if anyone has been affected
Clear and early communication helps protect others - and preserves your reputation.
Step 3: Report the Identity Theft to Authorities
Depending on the type of fraud, you may need to report to one or more of the following:
Action Fraud (UK): the national cybercrime reporting service
Companies House: if company records have been tampered with
HMRC: if your VAT or tax credentials were used
Your bank and financial providers: if credit or payment fraud is involved
Your cyber insurance provider: for potential recovery or legal support
Keep a record of reference numbers, case IDs, and any correspondence.
Step 4: Check for Other Signs of Compromise
Impersonation is sometimes the tip of the iceberg. It’s important to check whether there’s been:
A breach of your internal systems
Stolen email credentials or passwords
Publicly available sensitive information (e.g. old PDFs, invoices, employee data)
A connection to phishing, ransomware, or dark web activity
STORM Guidance can assist with threat intelligence and forensic checks to rule out wider compromise.
Step 5: Secure Your Digital and Legal Footprint
To prevent further misuse:
Lock down admin accounts and change key passwords
Apply multi-factor authentication to all company systems
Register similar or misspelled domains (to prevent impersonation)
Monitor your company name online and on key registers
Review and update privacy settings and public-facing documents
You may also wish to place a fraud alert with credit reference agencies to flag any suspicious financial activity.
Step 6: Prepare a Public Response (If Needed)
If the fraud becomes visible (e.g. in the press, on social media, or via customers), it’s worth publishing a brief, clear statement:
Acknowledge the issue
Confirm what your company is doing
Share the correct contact channels
Reassure customers and partners
Avoid speculation or blame
STORM Guidance can help with incident comms and reputational strategy if needed.
How STORM Guidance Can Help
✔ Investigation into impersonation or identity fraud
✔ Threat intelligence and dark web checks
✔ Guidance on notifying affected clients and partners
✔ Regulatory and legal reporting support
✔ Cybersecurity reviews to prevent future abuse
Your Business Can Bounce Back from Identity Theft
It’s frustrating, but it’s not uncommon, and it doesn’t have to define your reputation.
With fast, structured action and expert support, most businesses recover quickly from identity theft and come back stronger.
STORM Guidance is here to help you take control and move forward with confidence.
