Security News > 2021 > July > Best Practices to Thwart Business Email Compromise (BEC) Attacks
Business email compromise refers to all types of email attacks that do not have payloads.
In a recent study, 71% of organizations acknowledged they had seen a business email compromise attack during the past year.
Recent BEC attacks include spoofing attacks on Shark Tank Host Barbara Corcoran, who lost $380,000; the Puerto Rican government attacks that amounted to $4 million, and Japanese media giant, Nikkei, who transferred $29 million based on instructions in a fraudulent email.
Read on to discover best practices every organization should follow to mitigate BEC attacks.
Provide real-life examples of recent BEC attacks and brainstorm what your company would do differently to thwart the attack.
Next-generation, advanced cybersecurity technology can help block any email threat, including spam, phishing, BEC and follow-on attacks, advanced persistent threats, and zero-day that attack vulnerabilities - all before the threat reaches end-users.