Good afternoon, everyone.
Thank you so much for taking the time to join us for our staying safe online.
How to beat the Cyber Criminals event today.
Now on this topic, fraud and scams have been around for many years, but one thing that's changed over time is how criminals operate, particularly in the increases we've seen in cyber enabled crime.
Now, if you've not heard that term before, cyber enabled crimes are traditional crimes which can be increased in their scale or reach by the use of computers, computer networks or other forms of information and communications technologies.
With all this in mind at today's event, we're going to be sharing insight into the tactics being used by cyber criminals to target us and how we can keep ourselves and our personal information safe.
And that will include discussing topics such as malicious software, remote access, social engineering and public Wi-Fi.
But in addition to that, we'll also be sharing tips on how to protect you and your family by expanding your knowledge on those topics, which will include highlighting the resources that are available to help you continue to build confidence that can help you to beat those cyber criminals.
Now, with that in mind, to help us expand our knowledge on the subjects, today we are joined by some wonderful guest speakers.
So first things first.
My name is Paul and I'm going to be your host for the session today and I'm part of the Digital Eagles and Money Mentors team here at Barclays.
But we're also joined by Becci Hinchliffe, who's a senior threat intelligence analyst in our Cyber Fraud Fusion Center, and Liz Stanton, MBE, who's a senior trainer and family protection manager at Get Safe Online.
So they'll be helping discuss the topics today and also talking about the work that organizations, including Barclays, are doing to protect individuals and communities across the country from cyber criminals.
Now, before we jump into the topics today, I'm definitely eager to learn a little bit more about the roles that both of our guest speakers do So if we can, Becci, if you wouldn't mind, if we come over to you first, can you tell us a little bit more about what you do in your role as a senior threat intelligence analyst?
Thanks Paul, definitely sounds a fancy name.
So what does that mean?
So my team's role is to ensure that we are aware of the existing and emerging fraud and scam threats that target our customers and ultimately implement solutions and controls to reduce that customer harm.
Now we've built what we call a cyber fraud fusion center internally with Barclays, which is made up of 60 different areas within the business to ensure that we work collectively together to understand exactly what those threats are end to end.
Amazing and thank you very much, Becci.
And then if we can Liz over to yourself, tell us a little bit more about your role within Get Safe Online.
Okay.
Thanks, Paul.
Well, there's nothing really exciting about me, I guess, where I started.
I'm an ex-police officer.
I retired after serving 25 years and I and I got involved with Get Safe Online, basically, because I just love the work that they do and they're more than just a website.
Basically.
I'm one of the senior advisors.
I write and deliver the bespoke training packages and I also train the ambassadors there.
that we've got across the world as well and I also actually go to the live events as well.
So as I say, we're not just a website, we're a lot more than that as well.
The live events, which are absolutely brilliant, gives us the opportunity to speak to many people about the scams that they've been involved with, their identity stolen, and in many cases we are actually the first people they've actually opened up to as well.
It's very insightful and it helps us do the work that we do as well.
Amazing.
Thank you both so much for that insight.
And as I say, it sounds really interesting both of those roles and especially the work that you're doing to help protect people and communities across the country.
On what is an ever growing problem in fraud and scams.
Now, one of the reasons why scams continue to be such a problem is because cybercriminals have become very clever at manipulating people into behaving in a way that they otherwise usually wouldn't.
Now, cyber cybercriminals who are looking to harvest details will often use a process called social engineering to do that.
So to get us started with the topic today, if we could stop looking over yourself, Liz, do you mind giving us a little bit more insight into what social engineering actually means?
Okay.
Well, in simple terms, it just is basically when cyber criminals, they just try and manipulate you to reveal your personal information, really sensitive information.
They'll use psychological tactics to trick you into sharing this information.
So we're thinking about personal information.
So your names, your addresses, your dates of birth, your bank account details, login details, and so much more.
Really.
And it's not just through emails, which we know as phishing.
And we've also got a term called Smishing, which is a form of fraud that uses text messages that could be Facebook Messenger, WhatsApp messages, anything on that sort of platform.
They'll send these messages they’re there to prompt you to either make use the phone numbers that are on there or to click on the links there and all of them take you to a dodgy website or potentially download malicious contents as well.
Now what we've also got is Vishing.
Well, that's when somebody rings you and they can use voice changing software, even add background noises to make it sound more convincing.
And what really gets lots of people is the ability, the fact that they cloned the telephone numbers.
So they'll use this as a tactic to convince you that they actually are or seem to be genuine.
And then the other thing, obviously, you know, criminals are really on it are the use of the QR codes through Covid, we were using them a lot more.
Well, the criminals are doing their own fake QR codes now and again.
They're just going to try and trick you to go into their dodgy deceptive websites.
So instead of hacking computers directly, they exploit human weaknesses.
It's less complicated.
It can be instant and certainly far easier than trying to hack into somebody's computer or the device.
We just have to remember that scams come in all shapes and sizes.
We are in control and it's for us to make the decisions what we do and not be manipulated by these scammers and criminals.
Brilliant.
Thank you so much for sharing that insight, Liz.
So with that in mind, if we can come over to you, Becci, if you wouldn't mind sharing a bit more information about how those details are actually harvested and then how they're actually then used to commit frauds and scams.
So so let's start off with a few statistics.
So 40% of crime now equates to fraud, and that is only increasing year on year.
So safe to say that fraudsters are becoming more and more sophisticated but also very calculated.
So these cyber criminals will look for specific opportunities in terms of where we may let our guard down.
For example.
Now, if we just take a look at how we receive deliveries, for example, now 90% of Brits now use Amazon and Royal Mail delivered to 32 million households across the year.
So at least one of us on this call would be expecting the delivery today more than likely.
I know I am certainly this afternoon.
And with that comes messages from those delivery firms in order to keep you updated with where you're tracking in terms of delivery.
Now, fraudsters have used this as an opportunity.
If they send out mass campaigns, i.
e.
you waiting for a delivery, that they will at least reach one or two persons per day.
Now, you'll see from the screen here, So let's bring this attack to life.
So how does this attack look and how do these simple messages lure you went then for a victim of a crime, which is fraud.
So stage one will be you receive an SMS message sent on screen here.
This is Royal Mail themed where we may have missed the delivery.
It's asking you to click your link.
Now, upon following that link, which again isn't unusual for delivery firms to use, you will then land on what we call a phishing page, very much branded like Royal Mail in this in this instance.
And it will be asking you for credentials.
So your personal details, which is name address of where you want the delivery to go for, but more importantly, asking you for card credentials, which a delivery firm will never ask, so they'll never be a delivery fee if you need to reschedule your delivery fee.
Now, upon this stage, you're giving the fraudster access to your card details.
But as we know, card details alone isn't enough.
You may need a third stage in order to then use those card details.
So there's a couple of tactics here that the cybercriminals will do following this Smishing campaign.
So first off, there may be a third page, which is asking you to provide an OTP (One Time Passcode).
So you will receive an OTP to your device of what is assumed to be for your redelivery fee that you're paying through Royal Mail.
But actually what that OTP is doing is the cybercriminals in the background are registering your card credentials to a Apple wallet or a Google wallet for example, and then the OTP in the background is actually two authorize that wallet registration.
Now once the OTP is been planted on that phishing page, the fraudster now has access to your card on a wallet and can spend at their chosen stores or even online as well.
But there's also another route that the fraudsters may use in terms of these phishing pages.
They may then do a follow up call.
So using the exact Smishing campaign to say, Hey, I'm calling from Barclays, for example, we've recognized that your cards been compromised and use that to lure you in a false sense of security that you're speaking to Barclays.
So there's a couple of ways that that just a simple SMS expecting a delivery or missed a delivery SMS can then lead to a compromise to your account.
So a couple of tips There is if you are expecting A, expecting a delivery, always be wary of these URLs that are asking for card credentials as a delivery firm will never ask you to provide your card details and always use the genuine websites as well.
And if you do receive a call from an individual following a campaign or out of the blue advising that they're calling from Barclays or other banks that you may use as well, always call the number on the back of your card, but we don't always see deliveries.
So this is just one a theme, a theme that we've seen this week in particular is Telco themed, so EE and O2 or Three etc.
, have all been the latest lure in terms of attempting to get the victims to click on the link and handover their card credentials.
But also you'll see on the page here Barclays as well.
So our brand is no different to other brands being used in terms of lure.
And the third image there, where it’s saying Barclays, we have detected a payment.
This is exactly how we would communicate with our customers where we've potentially identified a risky transaction in that we need to check is genuine.
And again, we see this as an opportunity to lure you in in a false sense of security, that it may be Barclays.
So again, when in doubt, always call the number on the back of your card and be aware of Barclays messages coming from random mobile numbers.
So we'll always try and use our tags where it says Barclays at the top.
So always double check the message before you respond.
Fantastic.
Thank you very much, Becci.
and really interesting insight into some of the tactics that are being used to socially engineer people's information.
So I think off the back of that, Becci, if we can just go back over to yourself again, would you mind just showing a little bit more insight to some of the other tactics that criminals will actually use to target people?
Yeah, sure.
So following on the line of vishing call that, that Liz touched on earlier where you may receive a call from an individual posing to be might be a financial institute or it could be Microsoft or any kind of anti-virus company.
Now, fraudsters have recognized gaining access to a device is very valuable to them.
So whether that be your desktop or your mobile device, granting them access will increase their tactics and essentially increase their cash out.
So fraudsters often use what we call remote access software, and this is a genuine piece of software.
So a lot of firms use this.
For example, if you are a business dealing with an I.
T.
firm and you need to computer fixed, they might ask you to download a remote access which enables them to connect to your device and fraudsters use this technology in order to lure their victims in to gain access to the device.
And what this does is it enables them to navigate your online banking platforms or your mobile banking platforms and facilitate that transaction or of authentication.
So whether they might be targeting further card authentication or directly on your digital channels, they use this technology in order to connect and take over your device essentially.
So a top tip there if you receive a call from an individual asking you to download software, that's a moment to reflect and ask yourself.
Would my bank really do this?
So a bank would never ask you to download access software, but ultimately it's not the bank that's calling, if it is another third party, again, always challenge and refrain from downloading that remote access to your device.
But there's also other threats as well arise on these wonderful little computers that we hold in our pockets now.
So we have our life on our mobile phones and we are pumping more and more technology into that.
And they are a great piece tool, and we use them on our day to day, but that means it's becoming more enticing for the cybercriminals to target.
So we are seeing a rise in what we call mobile malware now.
This essentially again enables threat actors to directly access your device to try and attempt to access your card credentials, your personal data.
We don't have enough time to go into detail today on mobile malware.
There's a significant amount of information on our websites, but if people do want to learn more about that, we can do further session specifically on mobile malware.
So really interesting in Becci.
So it seems like that in addition to targeting personal and financial information devices may also be targets for cyber criminals.
So, Liz, if you wouldn't mind, could you expand on that topic a little bit and share some further insight into how criminals may actually be targeting our devices?
Yeah, certainly Paul.
Well I just want to really mention the Wi-Fi.
Publid Wi-Fi really, because it's it's certain that possibly everybody somewhere along the line in their life that they will have connected to public wi-fi, they may have done it without having to enter a password, but in some instances that you've actually got to put your email there as well.
We just do need to remember that hackers and identity thieves are on there as well.
And that brings us on to where some of these criminals, they will take it a step further and they will set up their own copycat hotspots.
So you really don't need to be an I.
T wizz to do this just by using some equipment freely available on the web as well.
Practically anybody can do it.
So just think of all the places you've been where they've offered free wi fi coffee shops, shopping centers, hotels, trains, practically anywhere really where, where you go nowadays there is that free wifi Now a hacker, they'll set it up, It's like an unsecure wireless network and they can just basically call it anything they like.
So for example, free airport wi fi.
Let's keep in the holiday theme here.
Anybody who connects to this wi fi, this this network, they'll have their data harvested by the person who actually set up the network there as well.
So what I say is just be, you know, stay clear of them, really use your own data hotspot off your friends data if you can.
But if you really must use it, just make sure that you are on the right wi fi network.
Ask the the manager, ask the person behind the bar what they what the password is, and use a reliable paid VPN, a virtual private network to connect to it as well.
This will give you extra protection because it's all about layers, but it will also make it extremely difficult for the attacker to actually gather any information because all your information there will be encrypted and also limit what information you enter on there as well and make sure that you're checking the websites genuine before you actually enter any information on there.
We've got a tool check a website on the website it's free to use.
And it's a very simple, quick way to use.
And one of the good tip you just just before you visit the website, when you're on that website, just make sure you read the terms and conditions before you actually agree to anything.
When you don't agree, when you when you do agree or you just just ignore it and just go straight on to it, just remember that your website to harvesting all the information and they will share that information with third parties.
And that's probably why you keep getting ads and pop ups and spam emails about everything and everything that you've talked about and looked at in the past.
So just just be mindful of all that as well.
Brilliant.
Thank you so much, Liz.
So again, it sounds like to me there's there's lots of different tactics that have been used to target us.
I said a variety of different ways.
So on that note, Becci, is there anything further that we can do to avoid compromising our information, sorry, or the devices that we use?
Yes, we've put a huge amount of efforts over the years to really protect our desktop devices.
So keep security up to date on there with antivirus, etc.
and we need to treat all mobile devices the exactly the same.
So always use antivirus software when you can on your mobile device and keep your security up to date.
But also when we look at where OTP is are being circumvented.
So where two factor authentication is needed, there's a really great tool, on mobile devices now that will also populate the OTP on your device and it's fantastic if you're in a rush.
But what that means is you can often quite overlook the actual message of the OTP.
So a lot of firms will give you an insight what the OTPs for.
So for example, Barclays, if we're sending you and OTP to register for Apple Pay or Google Pay or for a mobile app, it will tell you in the message that it's that specifically what it's for.
And what we really advocate is to turn off auto feature.
So where you've got that auto enablement, it might take you an extra 10 or 20 seconds to go back and read that.
OTP But it's a really powerful message to understand exactly what that OTP is that you're inputing.
But there's also a couple of other kind of tactics that fraudsters use to be aware of.
So we've seen a rise in what we call call forwarding.
So where victims have fallen for a vishing call and the fraudsters will ask you to call forward your message, your your number to a completely new mobile number.
And what that means is that you won't receive any calls to your mobile once you've facilitated that call forwarding feature.
And all the other calls will then go directly to the fraudster.
So that means if your bank or any kind of financial institution that you're in communication with is attempting to contact you, this will go directly to the fraudsters too.
So just one thing to be aware of.
If you receive a call from someone asking you to do a feature like start 21 hash, for example, and then follow in my mobile number, just take it to take the kind of step five and think, What is it exactly that I'm doing here?
Because this maybe facilitates it.
a call forward to your mobile.
Brilliant and thank you so much for that, Becci.
And just before we move on Liz, do you have anymore tips that we can share that can help people to protect the information that's held on their devices.
Well, yeah, absolutely.
Just thinking about your devices and all the information that's held on there, not just your information, by the way, because I'm sure you'll have got lots of pictures of your friends and your families on there as well, and possibly some sensitive documents on there as well.
So thinking about that and thinking about the increase in some areas of stolen mobile phones right out of your hands.
And so if you're walking along than you concentrated on your phone and not thinking about what's going around are criminals are snatching these phones.
And the problem is the phones are actually potentially still open there and they can have access to things.
So what do we do?
Well, firstly, we probably go into a meltdown.
If you break your phone, you can't access anything.
But there are simple ways and that is backing up your data, storing your data remotely potentially on cloud services as well.
There's so many cloud services out there.
What I would say to you is do your research and select one that offers robust security measures and it also allows you to access your files anywhere as long as you've got your Internet connection as well.
Now, what some people do say to us is that they are wary of cloud services against, you know, because they're unsure of it, they're not familiar with it and they don't know about it.
And what we would say then is make sure you store your data on separate hard drives or external drives devices.
I'm not saying you need to store absolutely everything.
That's not the case, just the things that matter to you and go through your information and start to look.
What would you miss if you didn't have access to it?
And if you are a business, what I would say to you is keep your emergency contacts and critical information on a hard copy and keep that somewhere safe.
But also accessible.
Because if you don't.
Time is essence when it comes to ransomware attacks or anything else there as well.
So it's just another couple of tips there for you to look at.
Perfect.
Thank you very much.
Liz and Becci as well for the insight that's been shared so far.
So I think a key theme that's come through in the discussion today is the value of the data that we, our devices and our accounts actually hold.
So with that in mind, if I go over to yourself, Becci, how else can we protect our personal or our financial data or our devices and accounts from cyber criminals?
Sure.
So avoid using the same password repeatedly is obviously key.
So we quite often use the same password repeatedly.
So if this does get breached on one website, then all your other websites that you've used or financial services that you've used that password are essentially compromised as well.
So really avoid and make sure that the password is unique to each login details that you hold, but also recognizing how much social media may enable fraudsters to access your data.
So I know it's great now that we've got all these platforms Facebook, Instagram, TikTok, Telegram, there's all sorts, and we become quite freely with the amount of information that we share on there or even accept in terms of new friends requests, etc.
So just be wary of what exactly you’re putting online.
And if you put something on the online question, if this got in the hands of the wrong person, could they use it?
So birthdays and certain areas that you may be around because fraudsters really are targeted and if they see you as a target, they will sit and kind of circumvent that data and build a profile on essentially who they're targeting.
So make sure you keep everything private within your close network and also the likes of like marketplaces on platforms and social media.
Just be wary that not all of them are genuine.
So if it's too good to be true, it probably is.
And they often put advertisements on where it's slightly lower priced and then the rest is only it's only minor, you probably wouldn't notice, but it is still maybe ten or £20 off, they will lean on the fact that people will go towards them, types of adverts and sadly end up being scammed.
So yeah, just be wary on social media is a huge enabler to a lot of fraud and scams that we see.
And it's the front door essentially for criminals and a huge playground for them to be collecting data of individuals.
they may be targeting.
Fantastic.
Thank you very much, Becci.
And so naturally, in a modern digital age, we have so many different accounts, which would include us using lots of different passwords to access them.
So if we can, Liz can I come over to yourself just to get a bit more insight into how we can actually protect those passwords.
Yeah, sure.
Paul, we have got lots of information on the website, by the way, because I know we can only say so much in the time that we've got.
But two critical ways to protect your password is to consider using a password manager.
And basically these are a piece of software which store all your usernames and passwords in like a vault like a bank vault.
Really, all you need to do is remember the master passwords and then you'll get in there as well.
Now, many devices will have a password generator already built in, which is really, really helpful.
It's easy to use with the added benefits of creating strong, unique passwords for different services that we all have and what they can also do is identify and warn about reused or even weak passwords as well.
Just remember, there's always a caveat that nothing's 100% safe.
Even if you are using reliable password managers.
Think about social engineering.
You know, if you if you master passwords given out, then obviously they've got access to absolutely everything on there.
Now, the other thing to think about it has been mentioned is two factor authentication or two step verification.
It does sound quite complicated, but it isn't and you're probably already using it, but just don't realize that it's actually called that as well.
Now, when it's enabled, it gives you twice the protection.
So even if cyber criminals have your password, they can't access your account at all.
It works by asking for more information to prove your identity, basically.
So for example, you will get a code sent to your phone when you sign in using a different device.
And if you're trying to change some of your settings as well.
But it is important that you don't share any codes and I mean any codes with anybody.
Basically, there is another additional layer you could use biometric authentication on your devices as well.
So I think most people are using this now.
Fingerprints, face scanners, things like that.
Safety is all about layers, as we know.
And just, you know, think back when I mentioned about the phones being stolen or snatched off your hands as well.
If they do gain access to your phone or your device just because you've been using it, there, and then they'll have access to it.
But unless they have the passwords, they won't be able to access anything else on that device as well.
So it is important that we store them safely and securely.
Please don't store them on the word documents or in notes, because believe me, people actually do that and leave it open on their on the phones that are as well.
Brilliant.
Thank you so much, Liz.
And so I think one thing that's come through in all the insights shared today, it will seem like vigilance plays a vital part in our ability to protect ourselves in that online world.
But if I can have Becci just come over to your self to learn a little bit more about how financial institutions in particular ourselves in this instance, are helping people to keep safe and educated on how to protect themselves from cyber criminals.
Yeah, so there's a lot that goes on in the background Paul.
So not just Barclays across the whole financial news industry, we invest millions throughout the year to ensure that we have the right solutions in place to detect and prevent as much fraud and scams as we can.
But where it falls short, where the fraud and scam may be a lot more sophisticated, for example, it really comes down to education and being aware.
So some of the forefront education pieces that might be visible to you as a customer who is the likes of confirmation of payee.
So this tool has been delivered across industries to ensure that the sort could an account number that you're inputting in the payment, for example, is who who they say they are.
So if you put it in Mrs Smith it will confirm that that bank account relates to Mrs Smith And this is a really key tool to be able to identify you are paying who you say you are.
But also additionally to that we've got the payment purpose which we really advocate individuals to digest before sending the payment.
So this will give you some kind of key top tips of certain themes of payment fraud that might be around during that time.
So example, friends and family, you take the paying of friends and family.
There'll be some top tips on that to look out for where fraudsters might target that particular payment journey of luring you in as a friend, for example?
So really do digest that information on screen and keep up to date with the education that we put on our websites as well.
So we're continuously updating that and learning and evolving what the threats are and making sure that we keep you up to date with the latest of what we're seeing.
But also that detection piece as well, making sure that we're on top of the threats to ensure that we can detect and prevent as well.
Fantastic.
That's absolutely brilliant that it's great having the opportunity to hear more about how institutions are protecting customers.
And as we know, education is pivotal to empowering people to stay safe in the online world.
So to support with that in education, we do have lots of resources that we will share and at the end of the session through our Barclays.
co.
uk and Digital Wings Learning platform, in addition to the amazing external resources available through platforms like Get Safe Online and as mentioned, we will showcase all of those resources at the end of the session.
But just before we close off a move to the Q&A part of the session, if I can just come back over to you, Liz, for a moment.
So based on everything that we've covered today in the session, it sounds like that we are all potential targets and it seems more important than ever that we educate ourselves and the people around us on how to stay safe online.
But in recent years, we've also seen a huge increase in the number of young people being targeted by cyber criminals.
So what tips can we share with our audience today about how they can protect young people in the digital world?
Okay.
Well, when it comes to children and young people, everything we've chatted about today is relevant to them as well.
And we all have a digital footprint.
Many parents, guardians, grandparents, even our friends take great delight in sharing children's milestones.
So just think about baby scans, baby showers, gender reveal parties.
All this information adds up to the child's digital well value, and that's what the criminals are after.
Basically, they'll use the children's data to perform scams, including identity fraud as well.
So in relation to the children's themselves, they will be targeted by scams and pop ups to all manipulated based on what you as the adult has posted about them.
So think about swimming gala posts, football trips, themed birthday parties.
All these things are part of the jigsaw that the criminals will use to engage with the children themselves.
So make sure that you've adjusted your privacy settings on social media, on all the apps and obviously on all the devices there as well, and make sure you avoid oversharing and equally as important, limit who can see the children's posts and personal details that you're posting there as well.
For all the children that are using gaming platforms, just be aware that criminals use the same platforms.
It's essential that you consider who your children are interacting with.
Just make sure you're ensuring your children understand the importance of privacy as well, even from a very early age.
Discuss sharing personal details online and of course, the risks associated with it.
Absolutely.
And thank you very much for that, Liz.
And Becci, if we can come back over to you as well.
We touched on social media earlier as a platform being used to target people's personal details.
And would this also be a channel used to target young people as well?
Yeah, absolutely.
Especially the likes of Tik Tok.
Now that's on the rise where it really entices young people to them platforms.
But there's two kind of sites really where they may target young adults or children on these kind of platforms.
So firstly you've got what Liz has touched on in terms of the identity theft.
You know, there's not much of a financial footprint for these individuals.
So it's a really good kind of foot in the door for criminals to kind of build that and use it later down the line.
And it comes down to that opportunity that we touched on earlier on at the event that they will look for the opportunity of targeting these because they are vulnerable and more enticing.
And so they will be quite patient as well.
And now there's the other side where we've got the fraudsters being quite flashy online showing what we can make loads of money is all the cars that we can, we can buy.
And this is the kind of the advertisement I guess, that they put online to draw young individuals into their kind of organized crime world.
So they'll entice them in with that lavish lifestyle of get rich quick type activity and now unfortunately fallen into the hands of these kind of organized crime groups.
They don't care that there's an individual that that kind of goal is money.
So they will be very desensitized to who the individual is that they're pulling in.
And so that means they will get them to coerce them to either commit the fraud with them.
So bring them into their world.
And but there is kind of signs that you can look out for so if you and your child or friend's child or family child is acting strangely with receiving large amounts of cash.
And when explained where the money is coming from, for example, and or traveling with unexplained reasons of travel and hanging around with kind of older generation, it's kind of come out of the blue.
So just something that's kind of off really in terms of it's come out of nowhere, which could be an indicator that they've been coerced by these kind of organized crime groups.
But there's definitely things that we can do to prevent this and Liz touched on this earlier.
But talking about the dangers of joining such organized crime groups or being enticed, but kind of key that you might not necessarily as a young adult or child, notice that you're being kind of pulled into that world.
So just raising awareness on them kind of flashy lifestyles of what might draw them in and things to look out for, but also keeping that kind of safety net of monitoring what your child may be looking at online or keeping tabs and using those kind of safety features that the social media platforms offer for the parents and grandparents, etc.
, Make sure that they are in full use.
You can, to monitor exactly what's been undertaken on those platforms.
Brilliant.
Yeah, definitely a really important topic.
We have seen a huge increase in the number of money mule scams have reported in recent years and through the resources we share, we do actually have replays of previous events we've hosted across the business that will include a session that was dedicated to money mules.
So we will share those resources with everyone in case you're interested and then expand in your knowledge on that problem that we are seeing.
And just before we move over to the close of the session and the Q&A part, if we can just go back over to yourself Liz, it does appear that gaming and social media platforms are actually been used to target young people.
So what steps can we take to ensure that young people in our lives are protected in that digital world?
Well, gosh, how long do we have to Paul?
I just just want to go back to what Becci was just saying about the gaming side and sides of things as well.
A lot of the kids don't actually.
They're lured into it.
It's a grooming process and they don't actually realize until potentially it is too late.
And one of the ways is the challenge the criminals will will will engage with them playing the games and then they'll call them out.
They'll call them out in the sense that either as good as they say they're good and they will then set them small tasks, which are tasks which are against the law, but they're trying to prove their worth just to prove who they are.
And then once they've got them hooked, once you've got them in that, then blackmail and all sorts of other things can come in.
So what can we do?
Obviously, it depends on the age of the child and the earlier we can we can get them get involved in their online world, the better.
I always get asked about parental controls.
Well, they do have the uses like software to filter content, monitor online activity, set time limits even.
But we just need to be aware that they're not childproof.
Children will find great pleasure in finding ways around them.
So it is important that we encourage the children to use strong passwords, unique passwords like we do, and also to protect their own information by not just clicking on popups or downloading files from all known sources or from potentially a text from their new online gaming friend.
And we need to help them set up the profiles as well on what information they put on there and keep checking in on the settings and change together as as the kids get older really as well.
And if they don't want them anymore, if they don't want the apps, they don't want the games, and take the time to take your information off, there and delete or delete the the apps and the accounts as well.
Certainly start with having regular conversations.
Don't wait till something happened and make sure that we are part of the digital world and not the enemy that the kids think we are as well.
And I've just got a couple of things as well before you actually let your child download a new app, just ask yourself, is the content of this app age appropriate?
Obviously every child is different.
What does this app content give my child?
Who do what?
What does the app allow that my children to connect with as well?
What parental controls are on the and what's the app teach with children?
Let's face it.
You know the online world is absolutely brilliant.
There's some fantastic apps there and there is always two sides on that as well.
So if you do decide to go ahead with downloading the game of the app, download it together, be part of the child's life right at the beginning, and ensure that the settings are set for the child at that age and the ability of the child as well.
So there's lots of food for thought there for Paul.
Amazing.
Thank you very much for that, Liz.
I'm Becci as well for the insight and that's been shared throughout the session.
So just before we move on, we do have one or two questions we want to try and cover off before we share those resources with our delegates today.
So I'll just quickly go back to yourself, Becci, just to see if there's anything else you want to add about steps that can be taken to help protect people from the threats posed by cyber criminals?
Yeah.
So as part of our role in threat intelligence, we look at multiple sources to help us identify new and emerging kind of threats that target our customers.
And that means that you as a customer are at the kind of heart of receiving smishing campaigns or maybe vishing calls.
And even if you don't respond because you have been able to identify that that might be a fake text message or a rogue call, that information is really still important to us because there might be sadly other victims that don't recognize it.
That is this smishing campaign so, If there's one note that I would love for you guys to take on this today, is that sending that information to us so we have a mailbox which we'll share at the end.
internet security mailbox, if you receive a smishing campaign or a call with someone posing to be Barclays, we still want to hear about it.
So even if you don't respond, it's really very important that we get ahead of those campaigns because ultimately we can take them down.
We work quite heavily with the Telcos.
We work across the industry to take down those numbers, take down those you URLs that are being distributed and do as much disruption as possible.
But also we do a lot with law enforcement as well.
So you may have seen in the media recently around the law enforcement takedown of a group called LabHost, which was a huge SMS gang, essentially, And all of that kind of intelligence that comes from our customers really supports that kind of disruption as well.
So you do it more than you realize if you share that kind of intelligence with us.
And it really helps us shape what what the landscape looks like.
So really open for you guys to share more with us.
when you see it, Brilliant and thank you so much, Becci.
And again, the sharing of that knowledge and insight is so important that we will, again, when we talk to the resources, share a way in which you can report those phishing, smishing and vishing attempts to help to grow that network and help organizations protect people from the threat posed by cyber criminals.
But with that, everyone that does bring our topic to a close for today.
Now, we do have a couple of moments put aside for a Q&A and we have one or two questions that have come through, which I will share with our guest speakers now.
So I think really good ones.
To start off with yourself, Liz, if you don't mind, is someon said that some online competitions, wants information like date of birth or place of birth as part of the option to play.
So given that information must be considered a dangerous thing to do.
So if we can just expand on that a little bit, please.
Yeah, absolutely.
And the classed as farming posts and the the basically there to collect information and it may not be as obvious as you think it may be.
One, week just, you know, like a little poster comment on your, your favorite teacher or your favorite holiday resource and then a week later there may be something else.
So it's building the picture.
And a lot of the times people don't actually check where the post originate from or come from just because their friends have already done or entered the competition or whatever.
People just take it as a given that it's okay to do.
And why not?
You're only entering the competition, but you're not giving them any details.
But actually when you actually pick it, you're giving them your name, your email address, your potential telephone number, and then obviously you can it'll go down the lines of all the other spams and phishing emails that you may get.
So it is about checking and certainly unless you know the business yourself and again, I will check out if they're if they're advertise in a competition, go to the business website, it'll usually be on there.
Make sure you're on the verified Facebook page even before you actually enter any any competitions or any personal details because it is the start of the jigsaw and that's what they're doing.
The criminals will wait it out if, if you are an interest to them or a backdoor into a business or anything else like that, they will wait and collect the information over time before they actually strike.
Fantastic.
Thank you very much, Liz.
I think you're really important, though, there is that the information that's requested on those quizzes or they'll often come in the form of other types of insights that you share with them will be linked back to questions that are often used to access platforms or to reset and login credentials.
So again, I think the importance of being aware of those threats on those different platforms is so important.
And so with that, Becci just able to come over to yourself with before we share those resources is how can people stay up to date with the latest scams so that they have a heightened awareness of the threats?
Yeah, sure.
So we keep our fraud and scams pages as up to date as possible.
So when we are aware of new fraud and scam threats that arise and we'll be sure to put that on our fraud and scams pages so frequently I read of that page.
So even if we digest it today, in a few weeks time, there's more than likely going to be new information on there.
So keeping up to date with that is key.
We also supply kind of short videos on our social media pages as well.
So the good use of social media is really good for education as well.
And also the likes of the BBC do some cracking documentaries as well on fraud and scams.
Range fraud and scams.
So really advocate looking at you kind of major media outlets as well that really bring these to life in terms of video form as well.
Fantastic.
Thank you very much, Becci and Liz for all the insights shared through the session today.
So I think in summary, it does seem like the tactics being used to target us are constantly evolving.
And I think the key way of protecting ourselves is by continuing to stay up to date with what tactics are being used.
Platforms we're most vulnerable on is absolutely key to us being empowered to stay safe and protect ourselves and the people around us from the threats posed by those cyber criminals.
So with that in mind, that does bring the session to a close today.
So as promised, we do have lots of resources that we can share to help you to continue to expand on the knowledge that you've gained from the session today.
The first one that we will share is the Take Five to Stop Fraud website.
So if you've not heard this before, Take five is a national campaign offering straightforward, impartial advice and that helps people prevent email, phone based and online fraud, particularly in instances where criminals will impersonate trusted organizations.
Now, how do you do this is by emphasizing the stop, challenge and protect mantra.
So with stop?
It's taking that time to think before parting with your money or your information as that is absolutely key to keeping you safe.
Also challenging yourself.
It is okay for you to reject, refuse, or ignore any requests you may receive and remember, only criminals will try and rush or panic you into making a quick decision and then ultimately by protecting ourselves.
So if we are worried that our details or our accounts have been compromised in any way, contact your bank immediately.
And if you think you've been scammed, you can report that to action fraud through their website or on their contact number.
Now, in addition to that, another resource we've touched on in the session today is the Get Safe Online website.
Now, this is a brilliant platform which enables support and education for both individuals and businesses.
So whether you're looking to protect your devices, to protect yourself, if you're looking for insight into shopping, banking and payments, or if you're simply interested in safeguarding the young people in your life.
There are resources available through that website which include insight for those who are new to the digital world and also access to their monthly protect newsletter, which will share insight into the latest news, views and advice on staying safe online.
And they also have a variety of tools available such as their website checker and their self-help tool centre.
So definitely a resource I would encourage everyone to look into and naturally through our own platforms here at Barclays, we have lots of information as well.
So on our Barclays.
co.
uk website, we have our fraud and security section and this will include information and insight that could help you to avoid fraudsters, beat scammers.
Learn more about how criminals are actually duping people into moving money on their behalf illegally.
And of course, lots of information on staying safe online.
Now, in addition to those resources, we also have our latest scams hub on that platform.
The latest scams hub, will give insight into a lot of topics that we covered off today, such as mobile malware, safe account scams, call forward and amongst many other topics.
And we also have replays from all of our previous events available through the website as well that will include our recent event on Money mules.
So helping people to understand the threats posed by mule herders.
And we also have replays on our impersonation scams event and an upcoming Ask the Experts event, which we ran back in December.
So lots of fantastic resources available through the website.
And then of course, we have our Digital Wings learning platform as well.
So here at Barclays, we're not just about financial success, we're about making a real difference in people's lives.
And that's why the Digital Eagles and Money Mentors are here.
We're here to help you master both digital and money skills.
So our mission is to help give everyone the tools to navigate the digital and financial world with confidence.
And we're here to make learning digital skills and financial literacy straightforward, accessible and empowering.
So we have a combination of self-guided learning resources and online events available for people to join.
And but we also have modules dedicated specifically to digital safety and fraud and scam awareness that includes how to stay safe online and improving your digital safety awareness.
And both of those learning platforms sorry, those learning modules also have our online safety hub built into them, which will have even more internal and external resources that can help you to report.
And phishing vishing and smishing attacks or just generally expanding your knowledge around cybersecurity and fraud and scam awareness.
So with that, everyone that does bring the session to a close today.
But with that, everyone, we will have a brief disclaimer which will come up on screen.
If everyone could just take a moment to read through that, that would be absolutely amazing.
But with that, it does bring our event to a close for today.
So first of all, I want to extend a huge thank you to everyone who took the time to attend the event.
And sincerest apologies to anyone who experienced technical issues when accessing the session.
Today, we will have a webcast of the event that will become available off the back of this.
So we will contact everyone to share insigh on how that can be accessed, but also want to extend a huge thank you to all of our wonderful guest speakers today.
As we've seen, there are so many different tactics and so many different platforms that cybercriminals are now using to target us.
Vigilance is such an important tool as we heard from both Liz and Becci.
So the more we can educate ourselves and the more we can share that knowledge with those closest to us, whether that's friends, family members, colleagues, anyone who we think could benefit from an upskill, that is absolutely key to helping us become empowered to protect ourselves from fraudsters and scammers.
But with that, I want to extend a huge thank you again to everyone who took the time to attend the event today.
We hope that you found it informative and we look forward to you joining us for another one of our events very soon.
Thank you so much, everyone.
Have a wonderful day and we will see you all on an event very soon.