5 ways to mitigate the risks of business email compromise attacks has been saved
Perspectives
5 ways to mitigate the risks of business email compromise attacks
Focus on five
In an increasingly common scam known as business email compromise (BEC), cyber thieves are posing as company employees or vendors to commit wire transfer fraud. The scam exposes firms of all sizes to heavy financial risks and losses. Read Deloitte’s recommendation on five ways to mitigate the risks of BEC attacks.
Explore content
- Five ways to mitigate the risks of BEC attacks
- Our take
- Download the PDF
- Get in touch
- Join the conversation
Explore the five ways to mitigate the risks of BEC attacks
Our take
BEC is a criminal phenomenon with potentially severe consequences. More likely than not, these types of attacks will continue to rise, both in frequency and losses to the companies that fall victim.
The majority of BEC criminals live and operate outside of the United States, making it difficult for law enforcement to prosecute them. As a result, prevention and detection are imperative. Now is the time for companies to educate themselves about BEC, train their employees, and create an environment that encourages compliance. Together with hardened networks and optimized controls, these measures provide organizations with the advantage they need to keep BEC at bay.
Recommendations
Protecting against the changing cybersecurity risk landscape
Future of risk in the digital era
Tech-Enabled Investigations Spark Experience
Harnessing investigation capabilities for accelerated performance