{"id":6901,"date":"2021-03-16T21:37:35","date_gmt":"2021-03-16T21:37:35","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6901"},"modified":"2023-07-18T18:00:09","modified_gmt":"2023-07-18T17:00:09","slug":"5-ways-to-prevent-business-email-compromise","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise","title":{"rendered":"How to Detect and Prevent Business Email Compromise"},"content":{"rendered":"<p>Business email compromises (BECs) are financial scams that typically target companies and employees that carry out wire transfers. They\u2019re usually more sophisticated than typical\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/how-spot-phishing-email-survivors-guide\" target=\"_blank\" rel=\"noopener\">phishing schemes<\/a>, and require a mixture of impersonation, surveillance, and compromised emails of real business contacts.<\/p>\n<p>In this article, we\u2019ll look at how BECs work, how to detect BECs, and a few effective strategies managed services providers (MSPs) can use to help their customers prevent BEC attacks.<\/p>\n<h2 class=\"h3\">How does business email compromise work?<\/h2>\n<p>Business email compromises are not high-tech scams. They rely on a sophisticated social engineering process to create a sense of authenticity. Instead of attacking vulnerabilities in cybersecurity systems, BECs rely on weaknesses generated by human behavior and interaction.<\/p>\n<p>BECs usually involve versions of spear phishing and whaling, using social engineering to carry out online attacks. BECs might involve outreach to employees under the guise of communications related to daily operations, or by pretending to be a business contact. But while phishing and whaling scams contact the target directly with fraudulent emails, BECs contact individuals through compromised institutional emails\u2014making them more convincing for the recipient.<\/p>\n<p>Typically, attackers attempt to gain access to a C-suite executive\u2019s account through phishing, malware, and other means. Once they gain access to the corporate email, they monitor the account to learn the communication habits of the executive, the contours of the business, and how it operates. Often, the attacker will send an urgent email requesting the recipient carry out a financial transaction. Because the communication looks like a routine transfer requested by a senior executive, suspicious activities may go unnoticed.<\/p>\n<h2 class=\"h3\">Is BEC the same as ransomware?<\/h2>\n<p>BECs are different from ransomware, although the two sometimes share tactics\u2014and both are becoming increasingly common. Ransomware, or ransom malware, locks users out of their system, which usually contains sensitive information and personal files. Victims are then instructed to pay a ransom in order to restore access.<\/p>\n<p>Ransomware, like BECs, often use social engineering tactics to make their deliveries seem more credible. Emails may look like they\u2019re sent from colleagues, business contacts, or trusted institutions. Unlike BECs, however, ransomware attacks don\u2019t require the attacker to gain access to corporate accounts to trick the recipient into carrying out financial transfers. Instead, they tend to target the recipient directly. A common form of ransomware is malspam, which delivers\u00a0<a href=\"https:\/\/www.n-able.com\/features\/malware-protection-software\" target=\"_blank\" rel=\"noopener\">unsolicited emails<\/a>\u00a0containing rigged attachments or links to malicious websites.<\/p>\n<h2 class=\"h3\">Can you detect a BEC?<\/h2>\n<p>While there are no fail-safe ways for detecting BEC attacks, there are common signs your employees can and should watch out for. Scammers rely on access to corporate information to create a sense of authenticity, so employees should always be cautious when reading internal communications from senior management. Common signs of BEC attacks include:<\/p>\n<h3 class=\"h4\">1. SPELLING AND GRAMMATICAL MISTAKES<\/h3>\n<p>Emails filled with grammar errors or spelling mistakes should always raise a red flag. When dealing with requests for large financial transactions especially, employees should be suspicious of typos and poorly worded missives. While BEC scams are likely more sophisticated than typical phishing attacks, their messages may still contain typos and grammatical mistakes that help reveal a scam.<\/p>\n<h3 class=\"h4\">2. SUSPICIOUS EMAILS FROM SENIOR MANAGEMENT<\/h3>\n<p>By sending emails from C-suite accounts, scammers ensure they gain a psychological advantage over their recipients. When receiving urgent instructions from senior management, employees should reflect whether it\u2019s out of character for a CEO or a CFO to send similar requests, especially if the requests pertain to sensitive information and large financial transactions.<\/p>\n<h3 class=\"h4\">3. REQUESTS TO BYPASS PROCEDURE<\/h3>\n<p>Most organizations, especially those that deal with large, time-sensitive financial transactions, will have strict security procedures in place. Employees should beware of requests that demand they bypass standard procedure for any reason, regardless of who they receive the request from. Requests to skip protocol are usually the best indication of an attack, and employees should always double check the source of the communication before carrying out similar requests. When in doubt, it\u2019s best to reach out in person to the C-suite executive the message looks to be from to confirm.<\/p>\n<p>Finally, organizations should take the time to educate their staff about business email compromises. Update your training tutorials to include the basics of BEC scams, how to recognize them, and establish protocols for responding to scams discovered after the fact.<\/p>\n<h2 class=\"h3\">How do you guard against business email compromises?<\/h2>\n<p>While there are no guaranteed ways to prevent employees falling prey to BEC scams, there are steps you can take to make your organization more secure. BECs rely on human fallacies and weaknesses, and you can prevent them by separating duties for carrying out financial transactions among several individuals. This way, you are adding layers of security.<\/p>\n<p>Additionally, businesses can protect their assets by making their mail security systems more robust in the following ways:<\/p>\n<h3 class=\"h4\">TWO-FACTOR AUTHENTICATION<\/h3>\n<p>Since BECs usually require access to a C-suite account, one way to help prevent BECs is to ensure your executive accounts receive the best protections. Using two-factor authentication increases protection against scammers because it requires, in addition to a set of login credentials, access to the account holder\u2019s device. Using a unique dynamic PIN when accessing the account from new devices will make it less likely that scammers are able to obtain access to executive accounts.<\/p>\n<h3 class=\"h4\">ANTI-SPAM SOLUTIONS<\/h3>\n<p>Anti-spam solutions can guard against more sophisticated forms of phishing, such as whaling and\u00a0<a href=\"https:\/\/www.n-able.com\/features\/spear-phishing-prevention\" target=\"_blank\" rel=\"noopener\">spear phishing<\/a>, and offer ransomware attack protection. But keep in mind that traditional anti-spam solutions are set to recognize falsified emails containing suspicious attachments, and they may have difficulties recognizing emails sent directly from a compromised corporate account. Nevertheless, they\u2019re an <a href=\"https:\/\/www.spamexperts.com\/anti-spam-filter\">essential feature<\/a> for protecting your assets.<\/p>\n<h2 class=\"h3\">Security software for business emails<\/h2>\n<p>Advanced security software can provide threat detection and prevention against multiple forms of attacks.\u00a0<a href=\"\/products\/mail-assure?promo=blog\" target=\"_blank\" rel=\"noopener\">N&#8209;able<sup>\u00ae<\/sup>\u00a0Mail Assure<\/a>\u00a0uses collective threat intelligence and machine learning to guard against BECs, spear phishing, whaling, and ransomware. Mail Assure offers:<\/p>\n<ul>\n<li><b>Sender Policy Framework (SPF):\u00a0<\/b>an email authentication standard that allows the owner of the domain to determine the servers that can send emails on its behalf.<\/li>\n<li><b>DomainKeys Identified Mail (DKIM):\u00a0<\/b>a security protocol that attaches a digital signature to outgoing emails so that the recipient can verify that the email was authorized by the owner.<\/li>\n<li><b>Domain-based Message Authentication Reporting and Conformance (DMARC):\u00a0<\/b>a mechanism that prevents\u00a0<a href=\"https:\/\/www.n-able.com\/features\/email-spoofing-software\" target=\"_blank\" rel=\"noopener\">email spoofing<\/a>\u00a0through a combination of DKIM signatures and SPF.<\/li>\n<\/ul>\n<p>One click on an email could have devastating consequences for your business. Ensure your business has what it needs to guard against business email compromises, phishing, and ransomware.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Business email compromises (BECs) are financial scams that typically target companies and employees that carry out wire transfers. They\u2019re usually more sophisticated than typical\u00a0phishing schemes, and require a mixture of&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6901","post","type-post","status-publish","format-standard","hentry","topic-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Detect and Prevent Business Email Compromise - N-able<\/title>\n<meta name=\"description\" content=\"Business email compromises are financial scams that typically target companies and employees that carry out wire transfers. Find out how to prevent them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Detect and Prevent Business Email Compromise - N-able\" \/>\n<meta property=\"og:description\" content=\"Business email compromises are financial scams that typically target companies and employees that carry out wire transfers. Find out how to prevent them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-16T21:37:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-18T17:00:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"How to Detect and Prevent Business Email Compromise\",\"datePublished\":\"2021-03-16T21:37:35+00:00\",\"dateModified\":\"2023-07-18T17:00:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise\"},\"wordCount\":1095,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Mail\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise\",\"name\":\"How to Detect and Prevent Business Email Compromise - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2021-03-16T21:37:35+00:00\",\"dateModified\":\"2023-07-18T17:00:09+00:00\",\"description\":\"Business email compromises are financial scams that typically target companies and employees that carry out wire transfers. Find out how to prevent them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mail\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/mail\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Detect and Prevent Business Email Compromise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Detect and Prevent Business Email Compromise - N-able","description":"Business email compromises are financial scams that typically target companies and employees that carry out wire transfers. Find out how to prevent them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise","og_locale":"de_DE","og_type":"article","og_title":"How to Detect and Prevent Business Email Compromise - N-able","og_description":"Business email compromises are financial scams that typically target companies and employees that carry out wire transfers. Find out how to prevent them.","og_url":"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-03-16T21:37:35+00:00","article_modified_time":"2023-07-18T17:00:09+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"How to Detect and Prevent Business Email Compromise","datePublished":"2021-03-16T21:37:35+00:00","dateModified":"2023-07-18T17:00:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise"},"wordCount":1095,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Mail"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise","url":"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise","name":"How to Detect and Prevent Business Email Compromise - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2021-03-16T21:37:35+00:00","dateModified":"2023-07-18T17:00:09+00:00","description":"Business email compromises are financial scams that typically target companies and employees that carry out wire transfers. Find out how to prevent them.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/5-ways-to-prevent-business-email-compromise#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mail","item":"https:\/\/www.n-able.com\/de\/blog\/category\/mail"},{"@type":"ListItem","position":2,"name":"How to Detect and Prevent Business Email Compromise"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/6901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=6901"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/6901\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=6901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}