The two most common attack vectors that lead to Business Email Compromise (BEC) are Phishing Emails and Compromised Credentials. According to recent studies, an estimated 3.4 BILLION phishing emails are sent daily. Additionally, the average internet user has approximately 100 different passwords to remember, which often leads to credential reuse. Those are some heaving things working against the average user, especially regarding email account compromise.
Unfortunately, we've seen many organizations have their business email accounts compromised through credential reuse. Business Email Compromise (BEC) can lead to propagating further BEC attacks and a full-blown data breach and network compromise. In this session, we'll walk through a real-world case study of a BEC attack, how BEC can turn into full network compromise, and lessons you can leverage to prevent this attack from occurring in your organization.
SBS | 1.50 |
This program uses Microsoft Teams. When you join the webinar, you will be presented with the option to use the Microsoft Teams app or access the event from your browser.
Webinar Recording | Module |