Identifying and Avoiding Business Email Compromise (BEC)
INTRUST Bank
Unchanging values are more relevant than ever. That's Tradition for Today. That's INTRUST Bank.
The number of phishing attacks that businesses experience is growing every year and there are no indications that it will slow down. However, there are a few things your business can do to prevent a successful phishing attack or minimize its effects. These?include:
Following these steps can reduce the number and severity of cybersecurity incidents at your?business.
What is BEC?
All businesses heavily rely on email communication to conduct daily functions, which puts them at risk of falling victim to business email compromise (BEC). BEC is a form of social engineering — when a cybercriminal gains access to a business email account and uses manipulative techniques to trick you into providing confidential information or sending money. Cybercriminals count on employees trusting that all email communications that look like they are from a vendor, co-workers, and customers are?valid.
Over the past few years, BEC has cost businesses billions of dollars, which is why it’s crucial that employees be aware of risks, slow down when processing emails, and understand how to verify?requests.
How BEC occurs
BEC occurs when a cybercriminal gains access to an email account or spoofs an email address to impersonate the sender. The cybercriminal sends an email to you as that person and asks for confidential information or for you to process a payment, click a link, or open an attachment. If you do one of those things, you may be sending money to the cybercriminal or allowing them access to your information or?computer.
Here's what it can look like to receive an email from a compromised?account.
From a customer or?vendor
领英推荐
From your CEO
How to recognize social engineering
Cybercriminals are getting better at creating seamless communications that look like they are from someone you know or a business you recognize. It can be helpful to read through our article on social engineering and keep the following in?mind:
How to protect your business
Be cautious of communications you receive that ask you to take an action, especially the?following:
Before you do anything, verify the request with the sender by calling a phone number you know is legitimate or speaking with the requestor in person. Do not call any phone numbers listed in the email you received. Instead, look up a known number for the requestor’s?company.
As your banking partner, we are dedicated to the success of your business — both through the business banking products we offer and the information we provide to help you keep your business safe. Visit our Security Center to learn?more.