LEARN WHAT TO DO BEFORE AND AFTER A BEC ATTACK
Think you can tell an impostor email—created by a cyber criminal—from a legitimate email? It’s not always easy.
Since 2015, more than 22,000 organizations have fallen victim to business email compromise (BEC) attacks.
BEC uses emails from fraudsters posing as an executive. They ask the victim to wire money or disclose sensitive information. Only later do the victims realize that the email didn’t come from the executive. The FBI estimates that organizations have lost an estimated USD $3.08 billion to BEC attacks.
Fortunately, you can protect your organization from BEC attacks. Start by reading our BEC Survival Guide.
- How BEC works and why it succeeds: the targets and tactics
- How to prepare and prevent an attack, including seven tips for handling a suspicious email
- Steps you can take after an attack for damage control and recovery, including where to report an attack
Download your copy now. And start building your BEC defenses.