Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Proofpoint > The BEC Survival Guide
 

The BEC Survival Guide

White Paper Published By: Proofpoint
Proofpoint
Published:  Apr 28, 2017
Type:  White Paper
Length:  20 pages

Business email compromise (BEC) is a simple attack that is confounding some of the most advanced companies in the world.

Unlike other cyber attacks, BEC emails donít contain malware or malicious URLs. Instead, they take advantage of social engineering.

How to Protect Your Organisation Fortunately, you can stop BEC attacks though a combination of people, process and technology.

Find out how in this guide from Proofpoint.



Tags : 
security, threat and vulnerability management, security, cyber attacks, email, threat detection