The Modern CISO’s Framework for Identifying, Classifying and Stopping Email Fraud
Business email compromise (BEC), also known as email fraud, is one of cybersecurity’s costliest and least understood threats. As BEC schemes have evolved, industry nomenclature has outlived its usefulness. Without a framework to describe and break down BEC attacks—let alone conceptualize them—researching and managing the threat is difficult, if not impossible. The Proofpoint Email Fraud Taxonomy is designed to help security professionals better identify, classify and block this ever-costly threat. Download this guide to learn:
- How to classify BEC attacks using identity, deception and theme
- Similarities and key differences between invoicing fraud and payroll redirects
- The essential human traits threat actors exploit in lures- and task-based attacks
- Why advance-fee fraud still works
Download your copy of Breaking Down BEC now.