The most dangerous form of Business Email Compromise (BEC) are often conducted via Spear Phishing to essentially conduct an Account Takeover (ATO). According to an FBI Internet Crime Complaint Center (IC3) report, “identified global exposed losses” from BEC scams increased 136 percent year over year.
Detect aberrant behavior that is commonly correlated to compromised accounts.
Protect your employees from the fine-tuned attacks that leak through your gateway.
Establish a customizable anti-phishing solution to automate compliance.
Quickly and easily highlight and lock links taking employees to phishing websites.
Spotlight high-risk sharing of sensitive data across a variety of file sharing platforms.
Identify fraudsters trying to trick Accounting and Finance to reroute payments.
Eliminate white noise and let your SOC focus on the work that matters.
Stop malware before it can be clicked or launched by unsuspecting users.
Only allow known and trusted contacts to join your Zoom meetings.
Examples of recent BEC attacks, Ransomware, Credential Theft and DLP corruption are widespread. Japan Airlines Co., lost ¥384 million (approximately $3.4 million) to hackers via Payment Fraud and fraudulent accounts in China. A BEC attack cost European-based cinema chain Pathé 10% of its total earnings at a staggering cost of $21.5 million — or roughly €19 million. Closer to home, Google and Facebook had their Security Operations Center (SOC) emails phished for over $100 million through a BEC campaign.