Business Email Compromise (BEC) Awareness

Start Quiz

Study Flashcards

3 Questions

What is BEC?

A type of attack process used by hackers

What should you do to confirm a request is real?

Contact the person directly

What is one way hackers try to gain access to personal and financial information?

By sending fake invoices

Study Notes

  • BEC is a common attack process used by hackers to gain access to personal and financial information.
  • The style of the email, punctuation and spelling, and the address of the sender can help identify a BEC attack.
  • Always be extremely cautious of requests to transfer money to an off-shore account.
  • By contacting the person directly, you can confirm the request is real beyond question.
  • Some attackers will use fake invoices that appear to be from a trusted business partner, in this case be careful to check the bank account matches the ones you have in your system.
  • Always follow proper procedure, any request to bypass procedure could indicate an attack.

Test your knowledge on identifying and preventing Business Email Compromise (BEC) attacks. Learn about recognizing suspicious email styles, verifying requests, and following proper procedures to prevent financial fraud.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser