Stop! And think, before you act on that email

How many times a day do you respond to an email without really thinking about its contents?  

Maybe it’s a request for some information. Perhaps it’s asking you to pay an invoice. All mundane stuff. But no sooner than you’ve hit send, you’ve fallen victim to a Business Email Compromise (BEC) attack.

A BEC attack occurs when a cyber criminal gains access to your business email account and uses it to trick your employees, customers, or partners into sending them money or sensitive information. They do this by impersonating someone senior, and abusing their position of trust.

It might sound like something that only happens to big corporations, but that’s not the case.

According to the FBI, small and medium-sized businesses are just as vulnerable to BEC attacks as larger ones. In fact, these attacks have cost businesses more than $26 billion over the past few years.

And Microsoft brings more bad news, with its recent findings showing that they’re getting both more destructive and harder to detect.

So, what can you do to protect your business from BEC attacks? Here’s our advice:

  1. Educate your employees: They are the first line of defense against BEC attacks. They need to know how to spot phishing emails, suspicious requests, and fake invoices. Train them regularly on cyber security best practice, like strong passwords, multi-factor authentication, and secure file sharing.
  • Use advanced email security solutions: Basic email protections like antispam and antivirus software are no longer enough to block BEC attacks. You need more advanced solutions that use artificial intelligence and machine learning to detect and prevent these attacks in real-time. Look for email security providers that offer features like domain-based message authentication, reporting, and conformance (DMARC), sender policy framework (SPF), and DomainKeys Identified Mail (DKIM).
  • Set up transaction verification procedures: Before transferring funds or sensitive information, establish a verification process that confirms the authenticity of the request. This could include a phone call, video conference, or face-to-face meeting. Don’t rely on email alone to confirm these types of requests.
  • Monitor your email traffic: Regularly monitor your email traffic for anomalies and unusual patterns. Look for signs like unknown senders, unusual login locations, changes to email settings or forwarding rules, and unexpected emails. Make sure you have a clear protocol in place for reporting and responding to any suspicious activity.
  • Keep your software up to date: Ensure that you’re always running the latest version of your operating system, email software, and other software applications. These updates often include vital security patches that address known vulnerabilities.

BEC attacks are becoming more common and more sophisticated, but with the right awareness, training, and security solutions, you can protect your business.

Don’t wait until it’s too late – take action today to keep your business safe.

If you want to know more about how to protect your business from cyber threats, our team is always ready to help you. Give us a call.

RELATED POSTS

Is Edge your business’s browser of choice? Microsoft’s thinking of automatically opening Copilot when you use it. It could boost productivity, but there are privacy concerns to be aware of…
Weak passwords are one of the biggest security risks to your business. Why? Because cyber criminals are getting smarter than ever before. If they manage to crack just one password, they could gain access to your sensitive business data, financial information, or even gain control of your entire system. Cyber criminals use automated tools to guess passwords, allowing them to try out millions of combinations in seconds. So, if you’re using something like “Password123” or “CompanyName2025”, you’re practically handing them the keys to your business. A compromised password can lead to big issues, such as: • Data breaches • Financial losses • Identity theft • Reputation damage But how do you create strong passwords without driving yourself (and your team) mad? Think of your password like a secret recipe, where only you should know the ingredients. It should: • Be at least 14 characters long (the longer, the better) • Include a mix of uppercase and lowercase letters • Contain a few numbers and symbols (like @, $, %, or &) • Not contain any common words or easily guessable information (like birthdays, names, or the word “password”) Instead of using a single word, you could try a passphrase – a short, random sentence that only you would understand. For example, instead of “Sailing2025”, try something like “Coffee&CloudsAreGreat9!”. This is much harder to crack, yet still easy to remember. You should also steer clear of these common mistakes: • Using personal info (your name, birthday, business name, etc.) • Reusing the same passwords across multiple accounts • Using simple sequences (“123456” or “abcdef”) • Storing passwords in an easily accessible place (like a sticky note on your desk) If remembering unique passwords for every account sounds impossible, there is another option: Password managers. These generate strong passwords, store them securely and autofill them for you. With a password manager, you only need to remember one strong master password for the manager app itself. The rest are encrypted and stored safely, reducing the risk of data breaches. Even the strongest password isn’t foolproof, which is why multi-factor authentication (MFA) is also important. MFA requires a second form of verification, like a one-time code sent to your phone or generated from an authentication app. If you have employees accessing your business systems, it’s a good idea to have a password policy in place to explain your rules and why they’re important. This should include: • Unique passwords for each system and account • Regular security training on password best practices • Business-wide use of MFA for critical systems • Scanning for compromised passwords regularly By making password security a priority, you can reduce the chances of a cyber attack creating a nightmare for your business. And if you need help making your business more secure, get in touch.

RELATED POSTS

Weak passwords are one of the biggest security risks to your business. Why? Because cyber criminals are getting smarter than ever before. If they manage to crack just one password, they could gain access to your sensitive business data, financial information, or even gain control of your entire system. Cyber criminals use automated tools to guess passwords, allowing them to try out millions of combinations in seconds. So, if you’re using something like “Password123” or “CompanyName2025”, you’re practically handing them the keys to your business. A compromised password can lead to big issues, such as: • Data breaches • Financial losses • Identity theft • Reputation damage But how do you create strong passwords without driving yourself (and your team) mad? Think of your password like a secret recipe, where only you should know the ingredients. It should: • Be at least 14 characters long (the longer, the better) • Include a mix of uppercase and lowercase letters • Contain a few numbers and symbols (like @, $, %, or &) • Not contain any common words or easily guessable information (like birthdays, names, or the word “password”) Instead of using a single word, you could try a passphrase – a short, random sentence that only you would understand. For example, instead of “Sailing2025”, try something like “Coffee&CloudsAreGreat9!”. This is much harder to crack, yet still easy to remember. You should also steer clear of these common mistakes: • Using personal info (your name, birthday, business name, etc.) • Reusing the same passwords across multiple accounts • Using simple sequences (“123456” or “abcdef”) • Storing passwords in an easily accessible place (like a sticky note on your desk) If remembering unique passwords for every account sounds impossible, there is another option: Password managers. These generate strong passwords, store them securely and autofill them for you. With a password manager, you only need to remember one strong master password for the manager app itself. The rest are encrypted and stored safely, reducing the risk of data breaches. Even the strongest password isn’t foolproof, which is why multi-factor authentication (MFA) is also important. MFA requires a second form of verification, like a one-time code sent to your phone or generated from an authentication app. If you have employees accessing your business systems, it’s a good idea to have a password policy in place to explain your rules and why they’re important. This should include: • Unique passwords for each system and account • Regular security training on password best practices • Business-wide use of MFA for critical systems • Scanning for compromised passwords regularly By making password security a priority, you can reduce the chances of a cyber attack creating a nightmare for your business. And if you need help making your business more secure, get in touch.
Ever clicked an online ad and wondered afterwards if it was a scam?… most of us have – and cyber criminals want us to keep doing it. Here’s what to look out for to stop your business’s data (and profits) falling into the wrong hands…
Scroll to Top