Marc Harris’ Post

View profile for Marc Harris, graphic

Owner / Principal Consultant - MicroAge NL

Business email comprimise is one of the biggest threats to your business. Here are some tips on how to spot the most common types of BEC. In today's digital landscape, the threat posed by malicious emails is ever-present, with some being particularly subtle and complex. There are three primary types of email threats that pose unique challenges in detection for users, emphasizing the critical role of employees in distinguishing between legitimate interactions and potentially harmful communications. Despite the investment in advanced security infrastructures by some companies, many others overlook this crucial aspect of their defense. Compromise of Business Emails This subtle threat involves individuals impersonating legitimate members of an organization or its affiliates to solicit sensitive information, such as money or identification details. Why is it hard to detect? These emails often mimic routine communications with a sense of urgency to elicit a quick response. Mobile devices can justify typographical errors or formatting issues, enhancing their perceived legitimacy. Additionally, unfamiliarity with colleagues’ personal email addresses often leads recipients to overlook discrepancies in the email's authenticity, especially when the names in the header and signature appear correct. Conversation Hack This threat emerges after a cybercriminal gains access to an internal account, inserting themselves into an ongoing legitimate conversation by using a similar domain and removing any incriminating traces, thereby isolating the hacker and their new target. Why is it hard to detect? The existing trust between the victim and a legitimate conversation participant makes the intrusion less suspicious. The main clue might be a minor change in the email address or domain, which can easily be overlooked, especially when the recipient is using a mobile device, distracted, or not thoroughly checking the sender’s details. Identity Theft This includes service identity theft, where hackers impersonate familiar applications to steal login information, and brand hijacking, where cybercriminals use stolen domains to pose as well-known companies. Why is it hard to detect? Users are accustomed to receiving legitimate requests from popular services to re-enter their credentials, making such fraudulent requests appear trustworthy. This often leads to victims inadvertently visiting phishing sites via deceptive links without much scrutiny. Given these varying security practices, the end user is often the primary target for these criminals. Raising awareness and providing ongoing education to company employees are essential strategies in bolstering cybersecurity. Let our experts help you enhance your organization's security measures. Contact us for more information.

To view or add a comment, sign in

Explore topics