Business email compromise (or BEC) is a form of phishing attack where a criminal attacks a business in order to defraud the company.
The criminals behind BEC send convincing-looking emails that might request unusual payments or contain links to 'dodgy' websites. Some emails may contain viruses disguised as harmless attachments, which are activated when opened.
Unlike standard phishing emails that are sent out indiscriminately to millions of people, BEC attacks are crafted to appeal to specific individuals and can be even harder to detect. BEC is a threat to all organisations of all sizes and across all sectors, including non-profit organisations and the government.
Tell tale signs of phishing
Spotting a phishing email is becoming increasingly difficult and will trick even the most careful
user. Having the confidence to ask ‘is this genuine?’ can be the difference between staying safe or a costly mishap.
How to spot signs of a phishing email/message:
If you start to receive phone calls from clients, and customers saying you are sending strange emails, the likelihood is someone is in your email account, and you need to take back control.
Firstly, log into your email account settings:
But don’t forget, have you or your IT team worked out how the attackers got in?
The Cyber Resilience Centre for the South East can help with our Remote Vulnerability Assessment.
Whether you are a school, retail business, legal firm or construction company, if you use and are connected to the internet then you may well be open vulnerabilities that you are not aware of. If your business is connected to the internet, this service can help you to identify weaknesses in that connection.
A remote vulnerability assessment is the digital version of a prospective burglar visiting your property to assess where your access points are. Instead of physically viewing your property, we can remotely look at your digital space to see where those points of entry would be for cyber criminals.
To identify where those access points are, we use the same toolsets and skillsets that hackers use to look at your businesses network and infrastructure. This service also benefits from regional Police and National Cyber Security Centre intelligence to capture the very latest known threats and techniques used by cyber criminals.
Discover how our Remote Vulnerability Assessment could help secure your business, here https://www.secrc.co.uk/remote-vulnerability-assessment
Click to Open Code Editor