Business Email Compromise (BEC) Attack Trends Report

CS Hub Logo
Posted: 03/23/2018

In the second half of 2017, Business Email Compromise (BEC) attacks continued to accelerate with 96% of organizations experiencing attacks. Because BEC attacks have no payload (such as a malicious attachment or URL) to detect and block, they are able to slip past most conventional security technology used to protect organizations. It's critical to gain a better understanding of the nature of BEC, for the sake of the enterprise.

This attack trends report takes a look at 1 billion real-world emails that were considered safe by conventional security technologies -- Secure Email Gateways (SEG), Advanced Threat Protection (ATP) and Targeted Attack Protection (TAP) -- and establishes which security technologies incorrectly classify emails as safe, and the nature of these malicious emails.

In this report, entitled "Business Email Compromise (BEC) Attack Trends Report," you'll be exposed to information on:

  • BEC attacks by imposter type, SEG, company size and industry
  • Which malicious emails bypass traditional email security protocols
  • Recent effective BEC attacks that resulted in up to $100 million in losses
  • What a typical organization sending BEC attacks looks like and which processes they use to launch an attack

So, download this report today to view pertinent data on BEC attacks -- segmented by helpful categories. This comes as BEC cements itself a persistent threat in the enterprise.

To continue viewing this content please fill out the form below and become an Cyber Security member.
Or if you're already a Cyber Security member, sign in below to download.

By entering in your information and submitting the form, you give the sponsor permission to contact you regarding their product and you agree to our User Agreement, Privacy Policy, and Cookie Policy.

CS Hub Logo
Posted: 03/23/2018