Operate more efficiently, reduce complexity, improve EBITDA, and much more with the purpose-built platform for MSPs.
Protect and defend what matters most to your clients and stakeholders with ConnectWise's best-in-class cybersecurity and BCDR solutions.
Leverage generative AI and RPA workflows to simplify and streamline the most time-consuming parts of IT.
Join fellow IT pros at ConnectWise industry & customer events!
Check out our online learning platform, designed to help IT service providers get the most out of ConnectWise products and services.
Search our resource center for the latest MSP ebooks, white papers, infographics, webinars and more!
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
4/12/2023 | 7 Minute Read
Topics:
In 2022, the FBI’s Internet Crime Complaint Center (IC3) received 21,832 business email compromise and email account compromise complaints resulting in more than $2.7 billion in losses. 95% of BECs result in financial losses between $250 and $985,000, with $30,000 being the median.
Business email compromise (BEC) is the biggest threat to corporate cybersecurity. BEC can see threat actors gaining access to a system and tricking employees into willingly giving away sensitive company information. Malicious phony business emails can also be trojan horses for ransomware.
The financial impact of BEC attacks can be devastating to your clients. Luckily, there are ways to prevent them. Let’s dive into how BEC attacks happen and how you can spot them before they wreak havoc.
To begin: what is business email compromise? Business email compromise (BEC) is defined as a type of cybercrime that involves using fraudulent emails to trick people into giving away money or sensitive information.
Business email compromise is not new. That said, email scammers are relentlessly creative, and they're constantly adjusting and updating their tactics to trick uninformed or careless employees. Here are a few of the common schemes cybercriminals use to abuse emails for financial gains, according to the FBI:
Some forms of business email compromise are subtler than others. But don’t get complacent: anyone can fall victim to a sophisticated, cutting-edge cyber scheme.
There are a few major types of business email compromise you should be prepared to address:
Any of the above attacks can also smuggle in spyware, malware, and any variety of viruses, the payloads of which can be immensely destructive.
While these are currently the most common varieties of business email compromise scams, cybercriminals are highly inventive; expect them to come up with more and more devious ways of capturing sensitive information.
Business email compromise attack examples serve as both a cautionary tale and learning opportunity for MSPs. Some notable historical attacks include:
Rimasaukas’ scam succeeded in convincing Google and Facebook that they owed Quanta money for computer components they never, in fact, purchased.
Rimasaukas was eventually caught and pled guilty to one count of wire fraud, for which he was sentenced to 30 years in prison.
This scam occurred in 2020, not long after Puerto Rico experienced a massively destructive hurricane and was still in the process of recovery.
To put it starkly, no business, no matter how large or powerful, nor any government, is fully protected against business email compromise attacks.
All businesses — and, as shown above, world governments — are vulnerable to BEC attacks. That's why it's essential that, as an MSP, you provide your clients with the proper education and tools they need to combat BEC. Our BEC checklist will show you what threats to look out for, how to monitor them, and the best ways to tackle them when they arise.
Here are a few ways you can protect clients from BEC attacks right now:
Deploy a modern email security solution. Bring a full suite of cybersecurity technology techniques to the table in order to automate endpoint detection and response protocols. This includes risk assessment, dark web monitoring, cloud app security, 24/7 incident response services, and more. Give clients the peace of mind that comes with full-bore cyber threat protection.
Stopping BEC is a sophisticated process. Check out our webinar, In the Aftermath: Business Email Compromise, to learn more about how to protect clients against BEC.
In the event of a BEC attack, instruct clients to remain calm — but act quickly behind the scenes. Here are the major steps MSPs can take to prevent an attack from worsening:
ConnectWise is here to help MSPs navigate today’s threat-laden cyber landscape. Check out our cybersecurity demos to see first-hand how you can keep your business and your clients safe.
Business email compromise (BEC) is a type of cybercrime that involves impersonating a legitimate business entity or its representative to gain access to sensitive information, such as financial information or confidential data.
There are several measures that businesses can take to prevent business email compromise (BEC) attacks:
Business email compromise works by tricking employees into thinking they’re receiving legitimate communication from trusted sources. Once an employee opens an email from what they think is a trustworthy source, they act as prompted — by giving the sender sensitive information or making wire transfers as instructed.
A managed service provider (MSP) can help spot BEC scams and minimize any damage they might do.
Here are some common signs of a BEC attack:
If you receive a suspicious email, do not open it. Alert your MSP or cybersecurity team to its existence immediately.