Aegis Security Consulting’s Post

Business Email compromise, or BEC has been around for as long as businesses have been using email. With the proliferation of security measures and user recognition of such attempts to steal information and money, the number of BEC attempts that get through to the users mailbox may have decreased, however when there is money at stake. And when that amount of money is large enough, then just sometimes the malicious actors involved put in enough effort, and get just lucky enough to be successful. To make sure that you and your staff don't fall for a BEC, there are a number of steps that you need to take. The correct technical controls and measures to prevent as many malicious emails reaching your inboxes, good user education training and testing to make sure that if an email gets through the technical security measures, it will be recognised by the person it was sent to and reported, not actioned. The final step you need to implement is one of policy and procedure. The most common BEC is one that purports to be from a supplier, usually notifying you that they have changed their banking details, in the hope that when you next pay that supplier, it gets diverted to their bank account. A secure policy and procedure in place to address such requests will ensure that even if a malicious email gets through, and gets believed, the consequences of it will be neutralised. All of this needs to be part of every organisations security playbook. If its not in yours, come talk to us, we can help you address every aspect of your security making sure you don't become a cyber breach statistic. #BEC #BusinessEmailCompromise #securityplaybook #cybersecurity

Carbon black supplier Orion loses $60 million in business email compromise scam

Carbon black supplier Orion loses $60 million in business email compromise scam

therecord.media

To view or add a comment, sign in

Explore topics