Business Email Compromise (BEC) Attack Trends Report

Add bookmark

In the second half of 2017, Business Email Compromise (BEC) attacks continued to accelerate with 96% of organizations experiencing attacks. Because BEC attacks have no payload (such as a malicious attachment or URL) to detect and block, they are able to slip past most conventional security technology used to protect organizations. It's critical to gain a better understanding of the nature of BEC, for the sake of the enterprise.

This attack trends report takes a look at 1 billion real-world emails that were considered safe by conventional security technologies -- Secure Email Gateways (SEG), Advanced Threat Protection (ATP) and Targeted Attack Protection (TAP) -- and establishes which security technologies incorrectly classify emails as safe, and the nature of these malicious emails.

In this report, entitled "Business Email Compromise (BEC) Attack Trends Report," you'll be exposed to information on:

  • BEC attacks by imposter type, SEG, company size and industry
  • Which malicious emails bypass traditional email security protocols
  • Recent effective BEC attacks that resulted in up to $100 million in losses
  • What a typical organization sending BEC attacks looks like and which processes they use to launch an attack

So, download this report today to view pertinent data on BEC attacks -- segmented by helpful categories. This comes as BEC cements itself a persistent threat in the enterprise.

Upcoming Events

Automotive Cyber Security, Connectivity & SDV Week 2025

18th - 20th November, 2025

Van der Valk Hotel Berlin Brandenburg, Germany

Automotive Cyber Security, Connectivity & SDV Week 2025

Digital Identity Week

1st - 2nd September 2026

Sydney, Australia

Digital Identity Week

Latest Webinars

From Dependencies to Defences: Navigating Software Supply Chain Security

2025-09-24

11:00 AM - 12:00 PM SGT

Learn how to defend your software supply chain from dependency threats and build resilient security...

Unpacking global regulatory frameworks to enhance third-party operational resilience

2024-11-14

11:00 AM - 12:00 PM EST

Join this webinar to explore the resilience-focused requirements of DORA, NIS2 and other global regu...

Preventing financial and reputational risk with process intelligence

2024-05-23

11:00 AM - 12:00 PM EDT

Learn how to manage risk stemming from poorly controlled processes in a collaborative way

Recommended