The two most common attack vectors that lead to business email compromise (BEC) are phishing emails and compromised credentials. According to recent studies, an estimated 3.4 BILLION phishing emails are sent daily. Additionally, the average internet user has approximately 100 different passwords to remember, which often leads to credential reuse. Those are some heaving things working against the average user, especially regarding email account compromise.
Unfortunately, we've seen many organizations have their business email accounts compromised through credential reuse. BEC can lead to propagating further BEC attacks and a full-blown data breach and network compromise. In this session, we'll walk through a real-world case study of a BEC attack, how BEC can turn into full network compromise, and lessons you can leverage to prevent this attack from occurring in your organization.
How you will Benefit:
- Real-World BEC Attack Example
- Typical BEC Attack Walk-Through
- How BEC Can Turn Into Full Network Compromise
- What's in Your Email?
- Top Controls to Mitigate BEC Risk