{"id":6616,"date":"2021-05-18T04:14:21","date_gmt":"2021-05-18T04:14:21","guid":{"rendered":"https:\/\/www.ecsoffice.com\/?p=6616"},"modified":"2022-06-03T21:35:34","modified_gmt":"2022-06-03T21:35:34","slug":"business-email-compromise-attack-and-how-to-prevent-it","status":"publish","type":"post","link":"https:\/\/www.ecsoffice.com\/business-email-compromise-attack-and-how-to-prevent-it\/","title":{"rendered":"Business email compromise (BEC) attack and how to prevent it"},"content":{"rendered":"\r\n

Recently we have seen a rise in the quantity and complexity of email impersonation attacks. This article will review the Business Email Compromise (BEC) attack and the steps you can take to protect your business.<\/p>\r\n\r\n\r\n\r\n

What is business email compromise<\/strong><\/strong>?<\/h2>\r\n\r\n\r\n\r\n

A business email compromise is when a hacker or a malicious actor gains access to an email that belongs to an employee. After the email is compromised, the hacker can monitor all email communications, send emails, and delete emails (in many cases without the victim’s knowledge).<\/p>\r\n\r\n\r\n\r\n

How is business email compromised?<\/h2>\r\n\r\n\r\n\r\n

Business email compromise can occur for a variety of reasons. Here are the most common.<\/p>\r\n\r\n\r\n\r\n