…for the criminals.
Forget ransomware, BEC is the threat you should probably fear most of all. Unlike ransomware, which locks victims out of their systems using a strong encryption tool, Business Email Compromise (BEC) uses far less obvious and more sophisticated mechanisms which makes them harder to detect and easier to fall victim to. The effort for criminals is higher but the ROI (to put it in business terms) is definitely worth it. Continue reading
Business Email Compromise (BEC) attacks have expanded tremendously over the past few years, with a projected growth of over $9 billion in 2018. The combination of simplicity and effectiveness have ensured that BEC will continue to be one of the most popular attacks, especially for those who lack special tools and knowledge to pull off more complicated schemes. Continue reading
A growing concern of security professionals is internal phishing attacks – phishing emails sent from one trusted user to another of the same organization. Internal phishing emails are used in multi-stage attacks in which an email account is owned either by controlling the users device with previously installed malware or by compromising the account credentials of the user. Internal phishing emails are used in both targeted attacks, where the aim is to steal information or commit extortion, and common with Business Email Compromise (BEC) schemes designed to steal money. Because the sender is an internal and trusted user, the recipient is more likely to take action on the email. Continue reading
Earlier this month we launched our Security Roundup Report for the first half of the year. You can access the full report here, but here are some of the findings that stand out: Continue reading
Email has moved into the center of communications. This is especially true within the business sector, seeing as The Radicati Group discovered that the average employee sends and receives 122 emails every day. This digital means of discussion is incredibly convenient and quick, but it is far from a perfect system. Continue reading