Skip to content
Verity IT - Managed IT Support - Logo
Search
  • Managed IT Services
    • Managed IT Support
    • IT Security Services
    • Cloud Services
    • Telecommunication Solutions
    • IT Project Services
    • IT Strategy & Planning
  • About Us
    • About Us
    • Careers
  • Industries
    • IT Support for Accounting Firms
    • IT Support for Architects
    • IT Services for Construction
    • Healthcare IT Support
    • IT Services for Law Firms
    • IT Support for Municipal Government
    • IT Services for Long Term Care Facilities
    • Manufacturing IT Support
    • IT Services for NonProfits
    • Real Estate IT Support
  • Contact Us
  • Resources
    • IT Security Assessments
    • Blog – Managed IT Services Best Practices
    • Case Studies
    • Customer Portal
    • Events
    • F.A.Q.’s
    • Referral Program
    • Webinars
  • Search

Stop Targeted Attacks Before They Reach Your Users

Business Email Compromise (BEC) happens when the scammer poses as a trusted individual with a legitimate business request. BEC attacks are highly targeted, sent in low volumes and aimed at specific people.

The scams are hard to identify and may seem part of any day-to-day request to the target. BEC attacks cost businesses $2 billion in 2020 — could you and your employees identify a BEC scam? 

In this 30-minute interactive webinar, we cover:

  • The current messaging threat landscape
  • How BEC works
  • Mitigating email-based threats

Fill out the form to access the recording!

Name(Required)
This field is for validation purposes and should be left unchanged.

5 Types of Business Email Compromise

  1. The Bogus Invoice Scheme: Companies with foreign suppliers are often targeted with this tactic, wherein attackers pretend to be the suppliers requesting fund transfers for payments to an account owned by fraudsters.
  2. CEO Fraud: Attackers pose as the company CEO or any executive and send an email to employees in finance, requesting them to transfer money to the account they control.
  3. Account Compromise: An executive or employee’s email account is hacked and used to request invoice payments to vendors listed in their email contacts. Payments are then sent to fraudulent bank accounts.
  4. Attorney Impersonation: Attackers pretend to be a lawyer or someone from the law firm supposedly in charge of crucial and confidential matters.  Normally, such bogus requests are done through email or phone and during the end of the business day.
  5. Data Theft: Employees under HR and bookkeeping are targeted to obtain personally identifiable information (PII) or tax statements of employees and executives. Such data can be used for future attacks.

Because these scams do not have any malicious links or attachments, they can evade traditional solutions. Employee training and awareness can help businesses spot these type of scams!

Posted in WebinarTagged Cybersecurity, Managed Microsoft 365 Services

Post navigation

  Previous PostNext Post 
verity-it-white-logo

Verity IT provides Managed IT services, cybersecurity, and cloud services to help your business stay secure and run smoothly. With offices in Chicago, Nashville, Orlando, and Fort Myers/Naples, we are well-positioned to serve businesses across these regions. Our team is here to ensure your technology works for you, allowing you to focus on what you do best.

IT Services

Managed IT Services

IT Security Services

Telecommunication Solutions

IT Project Services

IT Strategy & Planning

Cloud Services

About Us

About Us

Careers

Contact Us

Customer Portal

IT Resources

IT Security Assessments

Blog

Case Studies

Events

FAQ

Referral Program

Webinars

Chicago IT Support

2001 Butterfield Road, Suite 102 
Downers Grove, Illinois 60515

Nashville IT Support

1204 S Main St., Suite D 
Columbia, Tennessee 38401

Orlando IT Services 

1800 Pembrook Drive 
Orlando, Florida 32810

Fort Myers IT Support

Naples, Florida 34109

©2024 Verity IT, LLC

Privacy Policy

  • LinkedIn
  • Facebook
  • YouTube
Search for:
Customer IT Support: 224-345-2640 or
[email protected]
This is default text for notification bar
Learn more