Best Practice Report

Video: Protect Your Organization From Business Email Compromise (BEC) Attacks

Watch Our Video To Understand A Real-Life BEC Attack And How To Protect Against These Frauds And Scams

Josh Zelonis
Andrew Hogan
 and  three contributors
May 08, 2019

Summary

Alongside other scams, fraudsters and cybercriminals use business email compromise (BEC) attacks to convince unwitting employees to wire money, grant access to payment accounts, or share sensitive financial documents. In this video, we discuss a real-life BEC attack and what the victim company might have done differently to avert the loss.

Log in to continue reading
Client log in
Welcome back. Log in to your account to continue reading this research.
Become a client
Become a client today for these benefits:
  • Stay ahead of changing market and customer dynamics with the latest insights.
  • Partner with expert analysts to make progress on your top initiatives.
  • Get answers from trusted research using Izola, Forrester's genAI tool.