Business Email Compromise (BEC) often starts with an email in which attackers pose as someone the victim trusts. In the message, there’s a seemingly legitimate business request that usually involves a wire transfer or financial payment. Some common BEC tactics include domain spoofing, display name spoofing and lookalike domains. None of these emails carries malicious payload. And they’re narrowly targeted at few people within an organization. This makes it hard to detect this new form of email threat.
Join our live demo to learn more about:
- How BEC works
- Real-life examples of BEC attempts
- How Proofpoint addresses common BEC use cases
Fill out the form to watch the webinar replay.