What is the business email compromise examples - PowerPoint PPT Presentation

About This Presentation
Title:

What is the business email compromise examples

Description:

Once a cyber criminal has increased access to an executive’s email a BEC scam normally takes one of five basic forms: CEO fraud, Bogus invoice scam, Attorney impersonation, Account compromise, Data theft. – PowerPoint PPT presentation

Number of Views:523
Slides: 11
Provided by: Sandraemily
Category:

less

Transcript and Presenter's Notes

Title: What is the business email compromise examples


1
One in Nine Email Users Encounter MalwareAre You
the One?
H T T P S / / H A C K E R C O M B A T . C O M /
2
One in nine email users had encountered email
malware during the first half of 2017.
Security firm Symantec The Symantec report states
The inference is
3
1. The report, which discusses mainly the threat
landscape where hackers spread malicious threats.
EEHAVE
Security firm Symantec
  1. BEC (Business Email Compromise) scams etc through
    email, also states that today users encounter
    threats.
  2. Email twice as often as any other infection
    vector.

4
  1. Email is by far the most popular method for
    attackers to spread malicious code.
  2. A user is almost twice as likely to encounter
    malicious code through email than being impacted
    by an exploit kit.
  3. One out of every nine email users has encountered
    email malware in the first half of 2017.

The Symantec report states
5
  1. This upturn translates into an increase of 11
    more spam emails in your inbox each month than a
    year prior.
  2. The research found that users working in the
    manufacturing, retail trade, construction and
    mining industries encountered 1.5 times more spam
    emails compared to others.
  3. The cost that a business today incurs, by way of
    managing spam emails, too gets discussed in the
    report.

The inference is
6
What is a Business Email Compromise (BEC) Attack?
  • BEC Attack is an work in which the attacker gains
    access to a corporate email account and spoofs
    the owner's identity to defraud the company or
    its employees, customers or partners of money.

7
What Can Do to Stop a BEC Attack?
  • Always double- check before sending
    money or data.
  • Require multi- factor authentication.
    Run regular spoof checks.
  • Teach employees how to spot phishing.

8
What is the types of Email threats to E- mail
Security?
Viruses Worms Trojan Horses, Spyware
9
How to Prevent BEC Scams?
To product a BEC attack from causing
heavy losses to the company is to use additional
means of communication, and not just email, IT sec
urity professionals should also rely on advanced s
ecurity solutions that block the malware used to
commit BEC attacks.
10
Thank You!
F O R M O R E
I N F O R M A T I O N
V I S I T
H A C K E R C O M B A T .
HTTPS//HACKERCOMBAT.COM/
Write a Comment
User Comments (0)
About PowerShow.com