On-Demand Webinar: BEC Attacks are the Most Costly Form of Phishing

 In the early days of the internet, phishing attacks were primarily involved with email; however, as technology has evolved, so have threat actors. At its core, phishing may still be the same concept. A threat actor finds a target or targets, uses social engineering, and they breach a system.

Business Email Compromise (BEC) attacks are particularly nasty as a threat actor will breach a system and take over an account, which in turn is abused to further propagate other attacks, steal money, or even private information. Join us for a presentation that takes a closer look at how BEC attacks are changing.

In this webinar you’ll learn about:

  • How BEC attacks have evolved
  • Why executives are most at risk
  • Break down and real examples of the BEC attacks
  • How companies should best handle the threat

This webinar took place on November 21 at 2 PM ET.

Fill out the form to the right to watch a recording of the webinar.  LinkedInFacebookTwitterEmail

LinkedInFacebookTwitterEmail