{"id":25652,"date":"2019-12-05T08:25:13","date_gmt":"2019-12-04T21:25:13","guid":{"rendered":"http:\/\/www.tomgrimshaw.com\/tomsblog\/?p=25652"},"modified":"2019-12-05T08:25:21","modified_gmt":"2019-12-04T21:25:21","slug":"how-to-prevent-business-email-compromise-attacks","status":"publish","type":"post","link":"https:\/\/www.tomgrimshaw.com\/tomsblog\/?p=25652","title":{"rendered":"How to prevent business email compromise attacks"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"730\" height=\"411\" src=\"http:\/\/www.tomgrimshaw.com\/tomsblog\/wp-content\/uploads\/2019\/12\/How-to-prevent-business-email-compromise-attacks.png\" alt=\"How-to-prevent-business-email-compromise-attacks.png\" class=\"wp-image-25653\" srcset=\"https:\/\/www.tomgrimshaw.com\/tomsblog\/wp-content\/uploads\/2019\/12\/How-to-prevent-business-email-compromise-attacks.png 730w, https:\/\/www.tomgrimshaw.com\/tomsblog\/wp-content\/uploads\/2019\/12\/How-to-prevent-business-email-compromise-attacks-300x169.png 300w\" sizes=\"auto, (max-width: 730px) 100vw, 730px\" \/><\/figure>\n\n\n\n<p>Business email compromise (BEC) scams are low-tech attacks that use social engineering techniques to exploit natural human tendencies.<\/p>\n\n\n\n<p>While they may not get as much attention from the press as high-profile ransomware attacks, BEC scams are considered one of the biggest threats facing companies today. Between June 2016 and July 2019, there were 32,367 successful BEC scams in the U.S., which cost U.S. businesses more than $3.5 billion, according to figures from the FBI.<\/p>\n\n\n\n<p>Fortunately, there are some very effective and easy-to-implement strategies for stopping BEC attacks. In this post, we\u2019ll show you how you can combine staff training, process implementation and authentication technology to protect your organization from BEC attacks.<\/p>\n\n\n\n<figure class=\"wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-emsisoft-security-blog\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/blog.emsisoft.com\/en\/34651\/how-to-prevent-business-email-compromise-attacks\/?ref=newsbox_ticker191119\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Business email compromise (BEC) scams are low-tech attacks that use social engineering techniques to exploit natural human tendencies. While they may not get as much attention from the press as high-profile ransomware attacks, BEC scams are considered one of the biggest threats facing companies today. Between June 2016 and July 2019, there were 32,367 successful &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.tomgrimshaw.com\/tomsblog\/?p=25652\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;How to prevent business email compromise attacks&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,10],"tags":[],"class_list":["post-25652","post","type-post","status-publish","format-standard","hentry","category-computer-tips-basic","category-general-interest","category-wealth-tips"],"_links":{"self":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/25652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=25652"}],"version-history":[{"count":1,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/25652\/revisions"}],"predecessor-version":[{"id":25654,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/25652\/revisions\/25654"}],"wp:attachment":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=25652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=25652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=25652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}