Summary
Alongside other scams, fraudsters and cybercriminals use business email compromise (BEC) attacks to convince unwitting employees to wire money, grant access to payment accounts, or share sensitive financial documents. In this video, we discuss a real-life BEC attack and what the victim company might have done differently to avert the loss.
Log in to continue reading
Client log in
Welcome back. Log in to your account to continue reading this research.
Become a client
Become a client today for these benefits:
- Stay ahead of changing market and customer dynamics with the latest insights.
- Partner with expert analysts to make progress on your top initiatives.
- Get answers from trusted research using Izola, Forrester's genAI tool.