Proofpoint – The Bec Survival Guide

Falling for an impostor’s email is easier than you might think.
Imagine this scenario: You work for a large company that has been involved in acquisitions. Your job is to pay the bills. One morning, you get an email from your CEO who’s travelling. He wants you to do a wire transfer so that he can start the process of acquiring another company. And he doesn’t want you to tell anyone until the deal is done. It’s not uncommon for your CEO to email you about wiring money. And it makes sense that he doesn’t want the news to leak.

This is an example of business email compromise (BEC), an attack that has hit more than 22,000 organisations around the world and cost an estimated $3.08 billion since the FBI began tracking it in January 2015. BEC attacks use email to trick people into wiring money or sending sensitive corporate information such as employees’ personal data. Fortunately, you can prevent BEC attacks from succeeding. Consider this guide a starting point. Learn about the factors behind the surge of BEC attacks, what to do if it happens to you, and most important, how to how to avoid falling victim in the first place.

Subscribe to the Daily Tech Insider Newsletter

Stay up to date on the latest in technology with Daily Tech Insider. We bring you news on industry-leading companies, products, and people, as well as highlighted articles, downloads, and top resources. You’ll receive primers on hot tech topics that will help you stay ahead of the game. Delivered Weekdays

Subscribe to the Daily Tech Insider Newsletter

Stay up to date on the latest in technology with Daily Tech Insider. We bring you news on industry-leading companies, products, and people, as well as highlighted articles, downloads, and top resources. You’ll receive primers on hot tech topics that will help you stay ahead of the game. Delivered Weekdays

Resource Details

Proofpoint, Inc. logo
Provided by:
Proofpoint, Inc.
Topic:
Tech Industry
Format:
PDF