Categories
Application Security IT Security Outsourced IT

Business Email Compromise Techniques

How do Cyberattackers Carry out BEC Schemes? Business email compromise (BEC) or email account compromise (EAC) is one of the most financially damaging online crimes, exploiting the fact that email is a common tool for conducting business, both personally and professionally.1 In a BEC scam, cyberattackers send out an email that appears to come from […]

Categories
IT Security

Business Email Compromise

What is Business Email Compromise? The Cybersecurity and Infrastructure Security Agency (CISA) explains a social engineering attack as an incident where “…an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems.”1 An attacker may seem innocuous or even charming, and may claim to be a new hire, a […]