Proofpoint
flow-image

Breaking Down BEC

Published by Proofpoint

The Modern CISO’s Framework for Identifying, Classifying and Stopping Email Fraud

Business email compromise (BEC), also known as email fraud, is one of cybersecurity’s costliest and least understood threats. As BEC schemes have evolved, industry nomenclature has outlived its usefulness. Without a framework to describe BEC attacks—let alone conceptualise them—researching and managing the threat is difficult, if not impossible. The Proofpoint Email Fraud Taxonomy is designed to help security professionals better identify, classify and block this ever-costly threat. Download this guide to learn:

  • How to classify BEC attacks using identity, deception and theme
  • Similarities and key differences between invoicing fraud and payroll redirects
  • The essential human traits threat actors exploit in lures- and task-based attacks
  • Why advance-fee fraud still works

Download Now

box-icon-download

Required fields*

Please agree to the conditions

By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@headleymedia.com.

Related Categories Compliance, Malware, Email, Email Threats, SAN, Cloud, Machine Learning, AIM