Scams can be complex, so let’s stop playing the blame game

As long as there has been the exchange of money, there has always been fraud. From Hegestratos, the first recorded fraudster in 350 BC Ancient Greece, to Charles Ponzi’s infamous scheme of redistributing investments, to the present day, criminals have always tried to find new and more sophisticated ways to dupe people out of their money.

Authorized Push Payments are the new big thing

For a long time, the blame has fallen on those defrauded. But the Financial Ombudsman Service has been making noise of late that this could be about to change, especially concerning APPS. Authorized Push Payments (APPs) are a type of scam that encourages someone, either an individual or business, to transfer money from their own account to a seemingly legitimate account. Once this is done, the money is usually quickly transferred to other accounts and out of the country, making it hard to recover.

In 2018, news broke of an APPS scam hitting a cancer patient and her elderly mother. They lost over £20,000 and their ability to pay for her care home. Wrongly or rightly, the bank claimed it was not liable. At that time, it was at the discretion of the bank to decide whether or not to reimburse the defrauded account. Should banks decide that the account owner was careless and grossly negligent for falling for the scam, they could refuse to reimburse the tricked customer.

The Financial Ombudsman Service later said, however, that this was unfair, hence banks now have to provide evidence that the consumers scammed were in fact grossly negligent. But before we start playing the blame game, let’s look at the bigger picture.

In 2017, 56% of fraud in the UK was cyber-related

These scams aren’t just a promise for fortune from a questionable ‘Nigerian Prince’, but rather, increasingly elaborate and realistic schemes. The reason for the growing complexity of user-targeted fraud is that criminals always pick on the weakest link. Where once this may have been the banks themselves, today banks and building societies have many security protocols in place to help prevent crime. According to UK Finance, they stopped £2 for every £3 in attempted fraud in 2017.

As it’s become more difficult and expensive to target the tech itself, it’s no wonder that fraudsters are going after customers with renewed vigour, in a manner that would make Hegestratos proud. By manipulating the insecure behavior of people, they manage to bypass what are otherwise secure systems. That’s why the FOS has also warned that people must adopt simple behaviors, such as not writing your PIN on the front of your credit card or automatically taking unsolicited email communications purporting to be from your bank at face value.

There should never be a single point of vulnerability, layering up is key

We don’t know how much the burden of responsibility will shift from customer to bank in the future, but what’s apparent is that further user education must be combined with a layered approach to cybersecurity across all business/consumer relationships – i.e. there’s never a single point of vulnerability for criminals to exploit. This of course will mean there’s no single point of culpability either.

Whether it’s a combination of two-factor authentication, biometrics, adoption of email protocols such as DMARC, security awareness training, the creation and enforcement of tighter policies and procedures, etc, the specifics may differ from organisation to organisation, but the rationale should remain consistent. Namely, we need to make the tech better to deal with these attacks, and humans less vulnerable. Ultimately, we need to adopt an attitude of shared responsibility for improving our defences, rather than just assigning blame when those defences are breached.

Find out more about Red Sift

Keen to find out more about Red Sift, what we do, and how our products help businesses keep their email infrastructure, employees, and domains secure? Get in touch with us below!

Get in touch

PUBLISHED BY

Clare Holmes

6 Sep. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Security

How to drive cybersecurity as a top business priority

Jack Lilley

Everyone has a role to play in protecting the enterprise. Whether you’re shaping strategy or implementing solutions, aligning efforts to mitigate critical risks ensures a stronger, more resilient enterprise. If you missed Red Sift’s recent webinar on “From Data to Buy-In: Driving Cybersecurity as a Top Business Priority” we’ve got you covered. The session…

Read more
DMARC

BreakSPF: How to mitigate the attack

Red Sift

BreakSPF is a newly identified attack framework that exploits misconfigurations in the Sender Policy Framework (SPF) a widely used email authentication protocol. A common misconfiguration involves overly permissive IP ranges, where SPF records allow large blocks of IP addresses to send emails on behalf of a domain. These ranges often include shared infrastructures like…

Read more
Certificates

Never miss an expiring certificate again with Red Sift Certificates Lite

Francesca Rünger-Field

SSL/TLS certificates are the backbone of secure, uninterrupted digital experiences—but managing them effectively to prevent downtime remains a persistent challenge. With browser and certificate authorities looking to reduce certificate durations to as little as 90 or even 47 days, keeping track of renewals has never been more critical. That’s why we’re excited to introduce…

Read more
DMARC

Navigating G-Cloud 14 for DMARC solutions: A guide for former NCSC Mail…

Francesca Rünger-Field

Navigating G-Cloud 14 for DMARC solutions: A guide for former NCSC Mail Check users With the NCSC discontinuing key features of its Mail Check service, including DMARC aggregate and TLS reporting, after March 2025, UK public sector organisations must prepare for this change by transitioning to alternative email security solutions. To support this shift,…

Read more