Tag: Business Email Compromise
The three email threat types that are hardest for users to detect
There’s a question that all organizations need to be asking themselves when it comes to securing their email security posture: Do my users know how to distinguish between a legitimate email and an email threat? Some businesses are able to invest...
Threat Spotlight: How attackers use inbox rules to evade detection after compromise
Automated email inbox rules are a useful and familiar feature of most email clients. They help people manage their inboxes and the daily flood of wanted and unwanted communications by enabling them to move emails to specific folders, forward them...
Combat BEC attacks with AI and security awareness training
Over time, cyber criminals have had to get more creative with their tactics. Cyber attacks have evolved from spam and malware to phishing, and now spear phishing, defined as, “fraudulently sending emails from a known or trusted sender to induce...
Ask an MSP Expert: What is a BEC attack and how do I explain it to my customers?
Q: We’ve heard that BEC attacks are one of the most prominent cybersecurity threats to our customers’ businesses today. What is this and how can we protect our SMBs from its attempts to breach our defenses? Business Email Compromise (BEC)...