Tag: Business Email Compromise

The three email threat types that are hardest for users to detect

The three email threat types that are hardest for users to detect

There’s a question that all organizations need to be asking themselves when it comes to securing their email security posture: Do my users know how to distinguish between a legitimate email and an email threat? Some businesses are able to invest...

/ January 18, 2024
Threat Spotlight: How attackers use inbox rules to evade detection after compromise

Threat Spotlight: How attackers use inbox rules to evade detection after compromise

Automated email inbox rules are a useful and familiar feature of most email clients. They help people manage their inboxes and the daily flood of wanted and unwanted communications by enabling them to move emails to specific folders, forward them...

/ September 20, 2023
Combat BEC attacks with AI and security awareness training

Combat BEC attacks with AI and security awareness training

Over time, cyber criminals have had to get more creative with their tactics. Cyber attacks have evolved from spam and malware to phishing, and now spear phishing, defined as, “fraudulently sending emails from a known or trusted sender to induce...

/ January 31, 2020
Ask an MSP Expert: What is a BEC attack and how do I explain it to my customers?

Ask an MSP Expert: What is a BEC attack and how do I explain it to my customers?

Q: We’ve heard that BEC attacks are one of the most prominent cybersecurity threats to our customers’ businesses today. What is this and how can we protect our SMBs from its attempts to breach our defenses? Business Email Compromise (BEC)...

/ March 18, 2019