info@verity-it.com (888)-642-8472
2001 Butterfield Road, Suite 102
Downers Grove, IL 60515
IT Support: 224-345-2640 or support@verity-it.com

Business Email Security: The Problem You’re Not Paying Attention To But Should Be

Business Email Security: The Problem You’re Not Paying Attention To But Should Be
July 31, 2021 Liz Pena

Email Threats Rose by 64% In 2020!

Organizations around the world rely on email every day to collaborate internally and externally. For most businesses email is the most important communication tool.

However, email communications are not secure. Attackers can spoof domains, distribute malware and spam via email channels and they can use social engineering to trick users to make payments or log into fake accounts.

Our 30- minute interactive covers:

  • The current messaging threat landscape
  • How business email compromise happens
  • Mitigating email-based threats

Fill out the form to receive the recording!

Meet The Host

Could You Detect a Business Email Scam?

Help Me Spot These Scams!

What Is a Business Email Scam?

A business email scam — also known as business email compromise (BEC)—is one of the most financially damaging online crimes. It exploits the fact that so many of us rely on email to conduct business—both personal and professional.

In a BEC scam, criminals send an email message that appears to come from a known source making a legitimate request, like in these examples:

  • A vendor your company regularly deals with sends an invoice with an updated mailing address.
  • A company CEO asks her assistant to purchase dozens of gift cards to send out as employee rewards. She asks for the serial numbers so she can email them out right away.
  • A homebuyer receives a message from his title company with instructions on how to wire his down payment.

Versions of these scenarios happen all of the time. And in each case, thousands — or even hundreds of thousands — of dollars were sent to criminals instead.

Learn more about how to protect yourself from business email compromise by joining our webinar!

source: fbi.gov