Scams can be complex, so let’s stop playing the blame game

As long as there has been the exchange of money, there has always been fraud. From Hegestratos, the first recorded fraudster in 350 BC Ancient Greece, to Charles Ponzi’s infamous scheme of redistributing investments, to the present day, criminals have always tried to find new and more sophisticated ways to dupe people out of their money.

Authorized Push Payments are the new big thing

For a long time, the blame has fallen on those defrauded. But the Financial Ombudsman Service has been making noise of late that this could be about to change, especially concerning APPS. Authorized Push Payments (APPs) are a type of scam that encourages someone, either an individual or business, to transfer money from their own account to a seemingly legitimate account. Once this is done, the money is usually quickly transferred to other accounts and out of the country, making it hard to recover.

In 2018, news broke of an APPS scam hitting a cancer patient and her elderly mother. They lost over £20,000 and their ability to pay for her care home. Wrongly or rightly, the bank claimed it was not liable. At that time, it was at the discretion of the bank to decide whether or not to reimburse the defrauded account. Should banks decide that the account owner was careless and grossly negligent for falling for the scam, they could refuse to reimburse the tricked customer.

The Financial Ombudsman Service later said, however, that this was unfair, hence banks now have to provide evidence that the consumers scammed were in fact grossly negligent. But before we start playing the blame game, let’s look at the bigger picture.

In 2017, 56% of fraud in the UK was cyber-related

These scams aren’t just a promise for fortune from a questionable ‘Nigerian Prince’, but rather, increasingly elaborate and realistic schemes. The reason for the growing complexity of user-targeted fraud is that criminals always pick on the weakest link. Where once this may have been the banks themselves, today banks and building societies have many security protocols in place to help prevent crime. According to UK Finance, they stopped £2 for every £3 in attempted fraud in 2017.

As it’s become more difficult and expensive to target the tech itself, it’s no wonder that fraudsters are going after customers with renewed vigour, in a manner that would make Hegestratos proud. By manipulating the insecure behavior of people, they manage to bypass what are otherwise secure systems. That’s why the FOS has also warned that people must adopt simple behaviors, such as not writing your PIN on the front of your credit card or automatically taking unsolicited email communications purporting to be from your bank at face value.

There should never be a single point of vulnerability, layering up is key

We don’t know how much the burden of responsibility will shift from customer to bank in the future, but what’s apparent is that further user education must be combined with a layered approach to cybersecurity across all business/consumer relationships – i.e. there’s never a single point of vulnerability for criminals to exploit. This of course will mean there’s no single point of culpability either.

Whether it’s a combination of two-factor authentication, biometrics, adoption of email protocols such as DMARC, security awareness training, the creation and enforcement of tighter policies and procedures, etc, the specifics may differ from organisation to organisation, but the rationale should remain consistent. Namely, we need to make the tech better to deal with these attacks, and humans less vulnerable. Ultimately, we need to adopt an attitude of shared responsibility for improving our defences, rather than just assigning blame when those defences are breached.

Find out more about Red Sift

Keen to find out more about Red Sift, what we do, and how our products help businesses keep their email infrastructure, employees, and domains secure? Get in touch with us below!

PUBLISHED BY

Clare Holmes

6 Sep. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
DMARC

From concept to market leader: Reflecting on the development of Red Sift…

Rahul Powar

Following Red Sift OnDMARC being featured in 18 reports in G2’s Spring 2025 Report, CEO Rahul Powar shares his thoughts on the innovation behind the product—and what’s driving its continued momentum in the fight against phishing and Business Email Compromise (BEC). When I founded Red Sift, my goal was to make proactive cybersecurity accessible…

Read more
DMARC

Keep your Microsoft Online Email Routing Address secure with Red Sift OnDMARC

Faisal Misle

Every Microsoft 365 tenant includes a default domain in the format tenantname.onmicrosoft.com. This is known as the Microsoft Online Email Routing Address (MOERA). What many don’t realize is that attackers have started using these domains to impersonate organizations in phishing attacks. If left unmonitored, MOERA domains can become a blind spot in your email…

Read more
News

Red Sift OnDMARC ranked #1 in EMEA and Europe for DMARC in…

Francesca Rünger-Field

G2’s Spring 2025 Report is here, and we’ve got some exciting news to share! Red Sift OnDMARC has been named the #1-rated DMARC solution in both EMEA and Europe, and that’s just the start. We also took the #1 spot in the Mid-Market Results Index and Mid-Market Usability Index, and were featured in 18…

Read more
DMARC

The Mail Check deadline has passed: Is your organisation at risk? 

Jack Lilley

The National Cyber Security Centre (NCSC) proposed changes to Mail Check services came into effect on 24 March 2025, including the ending of DMARC aggregate reporting. Organisations who are yet to comply must now seek an alternative provider or risk exposure to harmful cybersecurity incidents. This change comes as a measure to expand the…

Read more