You’ve Got Business Email Compromise! (Audio – Whitepapers)

Requests from the appropriate person, requests for wire transfers or sensitive employee information may be part of a normal workday.

BEC scammers take advantage of human psychology and business processes to trick your users.

It’s no wonder BEC scams have stolen billions of dollars from victims already—and the pace is accelerating. Here are some of the biggest, boldest and most brazen scams reported in recent months.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Resource Details

Proofpoint logo
Provided by:
Proofpoint
Topic:
Security
Format:
Podcast