BUSINESS EMAIL COMPROMISE AND EMAIL ACCOUNT COMPROMISE

No two BEC/EAC attacks are alike. A layered approach to security is essential.

Background
share close
Identity deception could be placing your business at risk

Whether they are spoofing an identity (BEC) or stealing a valid identity (EAC), attackers are using identity deception. That is the common email fraud element that needs to be addressed.

Business Email Compromise
Email Account Compromise
Business Email Compromise

Business email compromise (BEC) attacks ask the victim to send money or personal information out of the organization. Attackers do this by spoofing a person in authority, such as a CEO or VP of Finance. To stop BEC and email fraud attacks, consider implementing controls that:

  • Blocks email fraud attacks that use spoofed and lookalike domains
  • Analyzes all email content and headers using machine learning
  • Enables creation of global email authentication policy
  • Removes suspicious and unwanted email from end user inboxes
  • Shows authentication status across supply chain and business partners
  • Offers end user education to help identify business email compromise (BEC) attacks
  • Blocks attacks that use spoofed and lookalike domains
Email Account Compromise

Email account compromise can occur if a threat actor successfully tricks a victim into providing their credentials or accesses an account through other means. If an account is compromised, it can be used to move laterally inside an organization, steal data, or fraudulently communicate with your business partners or customers. In order to protect against email account compromise, you need a solution that:

  • Highlights brute-force attacks and suspicious user behavior across cloud applications
  • Identifies very attacked people
  • Forces password resets on email accounts that are compromised
  • Enables read-only access to unknown websites to prevent credential theft
  • Assess end user vulnerability to credential theft attacks

Protecting Against Business Email Compromise Phishing
  • Block attacks that use spoofed domains
  • Create a global email authentication policy (DMARC) and enforce it on an internet-wide basis
  • Control content entering your organization through personal webmail accounts
  • Force password resets and disable accounts that are compromised
  • Provide user-centric visibility into account attacks