{"id":15988,"date":"2019-08-05T03:21:05","date_gmt":"2019-08-05T11:21:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/08\/05\/news-9732\/"},"modified":"2019-08-05T03:21:05","modified_gmt":"2019-08-05T11:21:05","slug":"news-9732","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/08\/05\/news-9732\/","title":{"rendered":"Would you fall for a BEC attack?"},"content":{"rendered":"<p><strong>Credit to Author: Sally Adam| Date: Mon, 05 Aug 2019 10:16:23 +0000<\/strong><\/p>\n<div class=\"entry-content\">\n<p>Earlier this year the North Carolina county of Cabarrus in the U.S.A. <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/01\/north-carolina-county-falls-for-bec-scam-to-the-tune-of-1728083\/\">was hit by a BEC scam<\/a>, incurring loses to the tune of over $1.7m. Sadly, this is just one example of an increasingly common \u2013 and devastating \u2013 attack.<\/p>\n<p>Business Email Compromise (BEC) is where cybercriminals combine social engineering with phishing techniques to trick targeted individuals at organizations into transferring funds or data.<\/p>\n<p>Common approaches include hacking email accounts, spoofing the email addresses of senior executives, compromising trusted supplier emails, and spoofing bank and lawyer emails.<\/p>\n<p>BEC attacks are targeted and time-consuming, with cybercrooks often working to compromise a single organization over several months \u2013 motivated by the very high potential gains.<\/p>\n<p>And it\u2019s working. BEC attacks are on the rise and <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/12\/it-pros-were-understaffed-under-resourced-and-under-pressure\/\">53% of organizations<\/a> hit by a cyberattack last year say they were victims of phishing.<\/p>\n<h2>Minimize your risk<\/h2>\n<p>BEC attacks exploit the weakest link in the cybersecurity chain: people. They\u2019re all about tricking people into falling for their spoofed emails, forged documents, and fake information.<\/p>\n<p>All team members are potential targets for a BEC attack, not just finance, HR and senior executives \u2013 while they may not authorize big payments themselves, they may inadvertently give hackers information that helps them, or even access to company systems.<\/p>\n<p>That\u2019s why user education and training is key to minimizing the risk of a BEC attack. Through raising awareness of the issue and educating your teams on how to spot suspicious communications, you reduce the likelihood of being hit.<\/p>\n<h2>Sophos can help<\/h2>\n<p><a href=\"https:\/\/www.sophos.com\/en-us\/products\/phish-threat.aspx\">Sophos Phish Threat<\/a> is a phishing simulation and training tool that lets you <strong>raise<\/strong> <strong>user awareness<\/strong> by emulating the tactics used by real phishing attackers. You can set up test phishing campaigns in minutes.<\/p>\n<p>It also includes <strong>online training<\/strong> to educate people on how to spot and stop the real thing. Plus, you can <strong>measure<\/strong> progress to track improvement and demonstrate ROI to the business.<\/p>\n<figure id=\"attachment_59412\" aria-describedby=\"caption-attachment-59412\" style=\"width: 1400px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/phishthreat.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"59412\" data-permalink=\"https:\/\/news.sophos.com\/en-us\/2019\/08\/05\/would-you-fall-for-a-bec-attack\/phishthreat\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/phishthreat.png\" data-orig-size=\"1900,930\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Sophos Phish Threat\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/phishthreat.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/phishthreat.png?w=640\" class=\"wp-image-59412\" style=\"width:700px;height:auto;\" src=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/phishthreat.png?w=1400&#038;h=685\" alt=\"Sophos Phish Threat\" width=\"1400\" height=\"685\" srcset=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/phishthreat.png?w=1400&amp;h=685 1400w, https:\/\/sophos.files.wordpress.com\/2019\/08\/phishthreat.png?w=150&amp;h=73 150w, https:\/\/sophos.files.wordpress.com\/2019\/08\/phishthreat.png?w=300&amp;h=147 300w, https:\/\/sophos.files.wordpress.com\/2019\/08\/phishthreat.png?w=768&amp;h=376 768w, https:\/\/sophos.files.wordpress.com\/2019\/08\/phishthreat.png?w=1024&amp;h=501 1024w, https:\/\/sophos.files.wordpress.com\/2019\/08\/phishthreat.png 1900w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/a><figcaption id=\"caption-attachment-59412\" class=\"wp-caption-text\">Sophos Phish Threat campaign reporting<\/figcaption><\/figure>\n<p><a href=\"https:\/\/www.sophos.com\/en-us\/products\/phish-threat.aspx\"><strong>Try Phish Threat, for free, for 30-days.<\/strong><\/a><\/p>\n<p>In addition, our <a href=\"https:\/\/secure2.sophos.com\/en-us\/lp\/anti-phishing\/awareness-toolkit.aspx\">free anti-phishing toolkit<\/a> gives you a fantastic set of resources to educate your team on phishing. It includes posters for your workplace, a PowerPoint presentation for meetings, examples of phishing emails, and top tips to spot phishy emails. <a href=\"https:\/\/secure2.sophos.com\/en-us\/lp\/anti-phishing\/awareness-toolkit.aspx\">Get your copy today<\/a>.<\/p>\n<\/p><\/div>\n<p><a href=\"http:\/\/feedproxy.google.com\/~r\/sophos\/dgdY\/~3\/fSLtJpURUoU\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/shark.jpg\"\/><\/p>\n<p><strong>Credit to Author: Sally Adam| Date: Mon, 05 Aug 2019 10:16:23 +0000<\/strong><\/p>\n<p>A county in North Carolina recently lost $1.7m in a Business Email Compromise scam, stay alert to these sophisticated attacks.&lt;img src=&#8221;http:\/\/feeds.feedburner.com\/~r\/sophos\/dgdY\/~4\/fSLtJpURUoU&#8221; height=&#8221;1&#8243; width=&#8221;1&#8243; alt=&#8221;&#8221;\/&gt;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[10379,17591,12231],"class_list":["post-15988","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-corporate","tag-phish-threat","tag-sophos-products"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15988"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15988\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}