As we look toward a new year, security remains a top priority for business leaders. There is a continued level of variability in malicious actors’ chosen attack vectors and methodology, serving as a ...
A business email compromise policy can guide and allow employees to feel safer by following pre-defined rules. Here are eight things that should be in an organization’s BEC policy. Business email ...
The Fast Company Executive Board is a private, fee-based network of influential leaders, experts, executives, and entrepreneurs who share their insights with our audience. BY Stu Sjouwerman Businesses ...
Lila Kee is the General Manager for GlobalSign’s North and South American operations, as well as the company's Chief Product Officer. More than ever, organizations are paying greater attention to ...
There has been a big rise in business email compromise (BEC) attacks – and most victims work at organisations that weren't using multi-factor authentication (MFA) to secure their accounts. BEC attacks ...
The threat actors extensively research their target’s responsibilities and relationship with the CEO and create spoofed email accounts that look like real ones. Abnormal Security has identified two ...
Threat actors have typically used business email compromise (BEC) attacks to steal money from unwary organizations in recent years. But in a new twist, cybercriminals are using them to steal food ...
A global stop-payment mechanism created by INTERPOL successfully recovered over $40 million stolen in a BEC attack on a company in Singapore. INTERPOL says this is the largest recovery of funds stolen ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results