Business Email Compromise (BEC) Attack Trends Report

Add bookmark

In the second half of 2017, Business Email Compromise (BEC) attacks continued to accelerate with 96% of organizations experiencing attacks. Because BEC attacks have no payload (such as a malicious attachment or URL) to detect and block, they are able to slip past most conventional security technology used to protect organizations. It's critical to gain a better understanding of the nature of BEC, for the sake of the enterprise.

This attack trends report takes a look at 1 billion real-world emails that were considered safe by conventional security technologies -- Secure Email Gateways (SEG), Advanced Threat Protection (ATP) and Targeted Attack Protection (TAP) -- and establishes which security technologies incorrectly classify emails as safe, and the nature of these malicious emails.

In this report, entitled "Business Email Compromise (BEC) Attack Trends Report," you'll be exposed to information on:

  • BEC attacks by imposter type, SEG, company size and industry
  • Which malicious emails bypass traditional email security protocols
  • Recent effective BEC attacks that resulted in up to $100 million in losses
  • What a typical organization sending BEC attacks looks like and which processes they use to launch an attack

So, download this report today to view pertinent data on BEC attacks -- segmented by helpful categories. This comes as BEC cements itself a persistent threat in the enterprise.

RECOMMENDED