Anatomy of an Attack – Business Email Compromise (BEC)

Date:

May 21, 2024

Join us as we walk through a real-world case study of a Business Email Compromise attack! We’ll discuss how BEC can turn into full network compromise, and lessons you can leverage to prevent this attack from occurring in your institution. 

Have you ever reused a password? According to recent studies, the average user has about 100 passwords to remember. With so many passwords and a never-ending list of password requirements, it's no wonder so many people are reusing passwords.

Unfortunately, credential reuse can leave institutions open to Business Email Compromised (BEC). BEC can lead to not only further BEC attacks, but also a full-blown data breach and network compromise. In this webinar, you'll learn how to recognize BEC attack scenarios and gain best practices for controlling BEC risk.