Facebook Instagram Linkedin Tumblr Twitter Youtube
  • Buzz
    • Industry News
    • Products News
    • Policies
  • Semiconductor
    • Automotive Electronics
      • ADAS
      • Autonomous
      • Connected Car
      • Electric Vehicles
      • HEVs
    • Industry 4.0
      • Artificial intelligence
      • Machine Learning
      • Robotic
      • Smart Machine
    • IoT
      • Embedded
      • IoT Design
      • IoT Security
    • Power electronics
      • AC-DC/DC-DC/Converter
      • Battery Management
      • IGBT
      • Mosfet
  • T&M
    • 5G Testing
    • Oscilloscopes
    • RF & Wireless
    • SDN & NFV
  • Renewable
    • Energy Storage
    • Solar power
    • Wind Power
  • Industries
    • Aerospace & Defense
    • Automation
    • Blockchain
    • LED & Lighting
    • Medical Electronics
    • Power Management
    • Telecom
      • 5G Network
      • Wireless & Networking
  • Tech
    • 3D Printing
    • High Performance Computing
    • Security
    • Sensor
    • Smart City
    • Smart Home
    • Software
    • Virtual reality
    • Wearable
  • Cloud
    • Big Data
    • Cloud Computing
    • Cloud Security
    • Data Centre
    • Data Security
  • Editor’s Desk
    • Design Articles
    • Electronics Articles
    • Electronics Blog
    • In Conversation
    • Market Research
    • Tech Startups
    • White Papers
  • More
    • Contact
    • E-Mag
    • Events
    • Subscribe e-Newsletter
    • Webinar
Search
  • Trends & Forecast
  • ACN Newswire
  • Business Wire
  • NewsVoir
  • Subscribe e-Newsletter
  • Digital Magazine
  • Advertise with Us
  • Events
  • Contact
Facebook Instagram Linkedin Tumblr Twitter Youtube
Sign in
Welcome! Log into your account
Forgot your password? Get help
Privacy Policy
Password recovery
Recover your password
A password will be e-mailed to you.
TimesTech
  • Buzz
    • Industry News
    • Products News
    • Policies
  • Semiconductor
    • Automotive Electronics
      • ADAS
      • Autonomous
      • Connected Car
      • Electric Vehicles
      • HEVs
    • Industry 4.0
      • Artificial intelligence
      • Machine Learning
      • Robotic
      • Smart Machine
    • IoT
      • Embedded
      • IoT Design
      • IoT Security
    • Power electronics
      • AC-DC/DC-DC/Converter
      • Battery Management
      • IGBT
      • Mosfet
  • T&M
    • 5G Testing
    • Oscilloscopes
    • RF & Wireless
    • SDN & NFV
  • Renewable
    • Energy Storage
    • Solar power
    • Wind Power
  • Industries
    • Aerospace & Defense
    • Automation
    • Blockchain
    • LED & Lighting
    • Medical Electronics
    • Power Management
    • Telecom
      • 5G Network
      • Wireless & Networking
  • Tech
    • 3D Printing
    • High Performance Computing
    • Security
    • Sensor
    • Smart City
    • Smart Home
    • Software
    • Virtual reality
    • Wearable
  • Cloud
    • Big Data
    • Cloud Computing
    • Cloud Security
    • Data Centre
    • Data Security
  • Editor’s Desk
    • Design Articles
    • Electronics Articles
    • Electronics Blog
    • In Conversation
    • Market Research
    • Tech Startups
    • White Papers
  • More
    • Contact
    • E-Mag
    • Events
    • Subscribe e-Newsletter
    • Webinar
Home Editor's Desk Electronics Articles Business Email Agreement – When it is the right thing to define...
  • Editor's Desk
  • Electronics Articles
  • Cloud
  • Security

Business Email Agreement – When it is the right thing to define ‘executive’

By
TimesTech
-
June 17, 2019
0
589
Facebook
Twitter
Pinterest
WhatsApp
Linkedin
ReddIt
Tumblr

    Email security is a top-of-mind concern for many organizations, with business email compromise (BEC) gaining prominence as one of the lethal tactics adopted by cybercriminals to attack enterprises. Law enforcement agencies worldwide have been keeping a close watch on BEC scams as a result of the increasing losses year on year. According to the Federal Bureau of Investigation (FBI), BEC has incurred nearly $12.5 billion losses to companies as of 2018. On average, one successful BEC attack can cost the company $130,000. We reported the number of BEC attacks in 2018 increased by 28 percent globally.

    Nilesh Jain
    Nilesh Jain – Vice President Southeast Asia and India

    Falling victim to a BEC scam has long been a problem that generally arises from human negligence and our natural inclination to do what someone in authority asks of us. Because these scams do not have any malicious links or attachments, they can evade traditional detections. These two factors make BEC a persistent threat for enterprises. Before we delve into what measures an enterprise need to take to mitigate risks associated with BEC, it is important to know how it works.

    At the core of it, BEC is a form of spear phishing where an attacker, by pretending to be a high-ranking executive – usually the CEO, attempts to trick a victim – usually the CFO – into paying a fraudulent invoice. To do so, fraudsters carefully research and closely monitor the potential target victims – both the spooked executive and the one issuing the payment – and their organizations. The tone of the email is usually urgent.

    It is also observed that most BEC attempts happen in countries with established business hubs and those that see a lot of multinational business operations.

    BEC persists and new trends arise

    In India, some 1.5 billion email threats were blocked by us in 2018. BEC, as a form of email-based scam, remains a very potent and lucrative means of funneling money from companies. As per our security predictions for 2019, BEC scammers will target employees further down the company hierarchy this year, for example, secretaries or executive assistants.

    In what appears to be a product of masterful social engineering, BEC scammers are also reportedly using domestic money mules recruited via confidence or romance scams. After grooming these victims, scammers will trick them into opening accounts that will only be used for short term, presumably to avoid being tracked by the authorities. Another phenomenon noticed is that some BEC victims are tricked to purchase gift cards. In this BEC variation, a cybercriminal posing as a person in authority may send a spoofed email, phone call, or text to a victim, requesting to buy gift cards for personal or business purposes.

    Gearing up against BEC threats

    Businesses are advised to stay vigilant and educate employees on how not to fall victim to BEC scams and other similar attacks. It’s true that cybercriminals usually prefer big companies but there’s little guarantee that small and medium-sized enterprises won’t get hit. For one thing, smaller companies tend to have less robust security infrastructure in place.

    Here are some tips on how to stay protected and secure:

    • Be wary of irregular emails that are sent from C-suite executives authorizing an urgent payment. Look for discrepancies in the email address, the way it is written, the sign-off, and more. Review past emails that request transfer of funds to determine if this one is irregular.
    • Cybersecurity awareness training and enforcing best practices against email threats can help employees stay alert and not fall prey to these attacks.
    • Verify any changes in vendor payment details by using a secondary sign-off by company personnel.
    • Stay updated on your customers and vendors’ habits, including the details, and reasons behind payments.
    • Confirm requests for transfer of funds when using phone verification as part of two-factor authentication, use known familiar numbers, not the details provided in the email requests.
    • If you suspect that you have been targeted by a BEC email, report the incident immediately to law enforcement or file a complaint with the cybercrime department.

    Organizations should consider using a multilayered identification process for transferring resources and invest in smart email protection. There are advanced security technologies available now that can prevent users and organizations from falling for BEC attacks. For example, by studying and learning the unique ways executives compose their emails, a new AI-based technology is able to pick up on tiny details that set authentic emails apart from fraudulent ones, leading to better detection of BEC scams.

    BEC is here to stay, with Gartner predicting that through 2023, business compromise attacks will be persistent and evasive, leading to large financial fraud losses for enterprises and data breaches for organizations.

    • TAGS
    • BEC email
    • BEC threats
    • C-suite executives
    • cybercrime
    • FBI
    • Security
    Facebook
    Twitter
    Pinterest
    WhatsApp
    Linkedin
    ReddIt
    Tumblr
      Previous articleSVP of Keysight Technologies, Satish Dhanasekaran, Appointed in the Technical Advisory Council
      Next articleEkahau Announced Distribution Partnership with PV Lumens
      TimesTech
      TimesTech

      RELATED ARTICLESMORE FROM AUTHOR

      Wide Body Aircraft MRO Market

      Wide Body Aircraft MRO Market Size to Reach USD 39.07 Bn by 2034

      Green Technologies 2025

      Green Technologies To Watch For in 2025

      Accelerating The Indian Fleet Sector in 2025

      MOST POPULAR

      • All
      • Featured
      • All time popular
      More
        OptiMOS6 40V PQFN

        Infineon OptiMOS 6 40 V family: Impressive RDS(on) combined with superior...

        March 14, 2019
        techstreet enterprise

        Techstreet Partners with IPC to Offer EMS Through Techstreet Enterprise

        March 13, 2019
        togetU

        Are you ready to win Rs 1 Crore?

        December 30, 2018
        Taulia

        Taulia Enhances Platform with New AI Capabilities in a World First...

        March 25, 2019
        Understanding 5G New Radio Bandwidth Parts

        Understanding 5G New Radio Bandwidth Parts

        November 8, 2018
        Load more

        Recent Posts

        • How Bobble AI Is Personalizing Conversations with Generative AI
        • Semiconductor testing application guide demonstrates the power of reed relays in modern test systems
        • Vi deploys Ericsson’s high-performing radio solutions for 5G rollout in Delhi NCR
        • Wireless Broadband Alliance Services Launches Commercial AFC Service
        • Keysight and SPHEREA Join Forces to Strengthen European Aerospace and Defense Testing Capabilities
        ABOUT US
        TimesTech, India's #1 growing B2B Magazine and website on Electronics and Technology is exploring the editorial opportunity for companies/firms working in the EMS Industry.
        Contact us: [email protected]
        FOLLOW US
        Facebook Instagram Linkedin Tumblr Twitter Youtube
        • Privacy Policy
        • Terms of Service
        • Contact Us
        • Guest Post Guidelines
        © 2016 - 2025 TimesTech Media All Rights Reserved.