In the early days of the internet, phishing attacks were primarily involved with email; however, as technology has evolved, so have threat actors. At its core, phishing may still be the same concept. A threat actor finds a target or targets, uses social engineering, and they breach a system.
Business Email Compromise (BEC) attacks are particularly nasty as a threat actor will breach a system and take over an account, which in turn is abused to further propagate other attacks, steal money, or even private information. Join us for a presentation that takes a closer look at how BEC attacks are changing.
In this webinar you’ll learn about:
- How BEC attacks have evolved
- Why executives are most at risk
- Break down and real examples of the BEC attacks
- How companies should best handle the threat
This webinar took place on November 21 at 2 PM ET.
Fill out the form to the right to watch a recording of the webinar.