You've probably heard of phishing, but Business email compromise (BEC) is a type where hackers try to impersonate someone within your company or at a high level from a seemingly legitimate source to trick employees into giving them money, revealing sensitive information or getting involved in other activities that could compromise security, passwords, or other sensitive information. What does that look like? Well, a cybercriminal using a BEC attack will send an email that very closely resembles something legitimate. They will request payment for some business reason. They can take on the persona of a senior-level employee, VP, CEO, a supplier, vendor, business partner or other organization.
Where a traditional phishing attack targets an entire list of people, a BEC attack is customized and created to appeal to specific individuals — making them very difficult to suss out. BEC is a threat that all businesses, regardless of size or industry, should take seriously.
Common BEC Attacks
Data theft — Criminals pose as HR professionals or employees in other functional roles to obtain personally identifiable information or tax statements from other employees or executives.
Signs of a BEC Attack
Differentiating between legitimate business requests and BEC attacks can be difficult. Here are some signs that an email is a BEC attack.
Generic terms or lack of personalization
Variations to email addresses or company websites
Unfamiliar names or images
A sense of urgency or threatening language
Requests to send personal or financial information
Protecting Against BEC
BEC attacks can result in severe financial and reputational harm. Consider implementing the following cybersecurity practices to help reduce the risk for your organization.
Educate employees. Teach your employees to be wary of emails making requests, never click suspicious links and report any suspected BEC attack to IT.
Implement effective payment protocols. Ensure employees in charge of financial operations analyze invoices for validity and discuss them in person whenever possible.
Restrict access to sensitive data. Only provide access to sensitive data to trusted and experienced employees who require such information to conduct their work tasks.
For more information on cyberinsurance and protecting your digital footprint and assets, please contact us 910.762.8551 or email us at insurance@wellsins.com.