Content

Events
About

Business Email Compromise (BEC) Attack Trends Report

In the second half of 2017, Business Email Compromise (BEC) attacks continued to accelerate with 96% of organizations experiencing attacks. Because BEC attacks have no payload (such as a malicious attachment or URL) to detect and block, they are able to slip past most conventional security technology used to protect organizations. It's critical to gain a better understanding of the nature of BEC, for the sake of the enterprise.

This attack trends report takes a look at 1 billion real-world emails that were considered safe by conventional security technologies -- Secure Email Gateways (SEG), Advanced Threat Protection (ATP) and Targeted Attack Protection (TAP) -- and establishes which security technologies incorrectly classify emails as safe, and the nature of these malicious emails.

In this report, entitled "Business Email Compromise (BEC) Attack Trends Report," you'll be exposed to information on:

  • BEC attacks by imposter type, SEG, company size and industry
  • Which malicious emails bypass traditional email security protocols
  • Recent effective BEC attacks that resulted in up to $100 million in losses
  • What a typical organization sending BEC attacks looks like and which processes they use to launch an attack

So, download this report today to view pertinent data on BEC attacks -- segmented by helpful categories. This comes as BEC cements itself a persistent threat in the enterprise.

Download PDF Attachment

Upcoming Events


Digital Identity Week

June 11 - 13, 2024
Melbourne, Victoria
Register Now | View Agenda | Learn More

MORE EVENTS