{"id":13006,"date":"2023-05-24T15:21:04","date_gmt":"2023-05-24T05:21:04","guid":{"rendered":"https://insights.namescan.io/?p=13006"},"modified":"2023-06-08T15:53:38","modified_gmt":"2023-06-08T05:53:38","slug":"compromised-business-email","status":"publish","type":"post","link":"https://namescan.io/insights/compromised-business-email/","title":{"rendered":"Business Email Compromise: Understanding the Threat to Your Business"},"content":{"rendered":"<p><a href=\"https://fr.namescan.io/freeemailcompromisedcheck\"><span data-contrast=\"none\">A business email compromise</span></a><span data-contrast=\"auto\"> is a type of cybercrime that is becoming increasingly prevalent, causing significant financial losses to companies around the world. This sophisticated scam can be difficult to detect and is specifically designed to exploit weaknesses in a company’s internal processes and technology. </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">Understanding what business email compromise is, how it operates, and what some warning signs are will help you prevent your business from falling victim to this kind of attack.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<h1 aria-level=\"2\"><span data-contrast=\"none\">What is Business Email Compromise (BEC)? </span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"> </span></h1>\n<p><span data-contrast=\"auto\">BEC is a type of cybercrime in which a hacker targets a senior executive or another company employee to make them transfer funds to an account controlled by the hacker or to reveal sensitive information. </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<h1><span data-contrast=\"none\">How does it work</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">?</span></h1>\n<p><span data-contrast=\"auto\">To obtain control of a senior executive or an employee of a company, the hacker sends an email to a senior manager that directs the user to “fake websites” that look very similar to the websites of legitimate entities to steal email information.  In some circumstances, the hacker will send attachments to the senior manager&#8217;s email containing a virus that will be activated when accessed.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">Once the hacker gains access to the email, they can carry out several malicious activities, including:</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Sending requests to the finance department from the senior executive&#8217;s email address, requesting payments be made to an account controlled by the hacker.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><br>\n</span></li>\n</ul>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Posing as a trustworthy supplier or vendor, seeking a change in payment method or bank account details, and providing a new bank account number controlled by the hacker. The email may also include a sense of urgency or a convincing reason for the change in payment method.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><br>\n</span></li>\n</ul>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\"></span>False job offers are made to potential applicants, requesting personal information such as Social Security numbers, bank account details, and passport information via an email from a human resources employee. The hacker may exploit this information for identity theft or unauthorised transactions from the individuals&#8217; accounts.</li>\n</ul>\n<p><span data-contrast=\"auto\"> These are just a few examples of the many ways a hacker might exploit a BEC.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<h1 aria-level=\"2\"><span data-contrast=\"none\">Why Should Businesses Care? </span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"><br>\n</span></h1>\n<p><span data-contrast=\"auto\">BEC attacks can result in significant financial losses for companies. In some cases, the hacker may request large sums of money to be transferred, and if the company&#8217;s finance department does not detect the fraud, the funds may be sent to the hacker&#8217;s account.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">In addition to financial losses, BEC attacks can also cause damage to a company&#8217;s reputation and can be costly to resolve. Companies may also face legal consequences if they are found to have ignored red flags and transferred funds to an unauthorised party.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<h1 aria-level=\"2\"><span data-contrast=\"none\">Red Flags for BEC </span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"> </span></h1>\n<p><span data-contrast=\"auto\">It&#8217;s essential for companies to be aware of red flags that may indicate a BEC attack. Here are some common red flags to watch out for: </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<ul>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"3\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Emails from organisations or people that the company does not usually do business with</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"3\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Emails that appear to come from a senior manager requesting payment to a person or organisation not known or with an unusual email address</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"3\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Emails that request immediate action for payment</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"3\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Emails stating changes in an account number and bank information for any reason</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<h1 aria-level=\"2\"><span data-contrast=\"none\">How to Protect Your Company</span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">?</span></h1>\n<p><span data-contrast=\"auto\">To protect your company from BEC attacks, it&#8217;s important to implement security measures and procedures that help prevent fraud and protect sensitive information. Here are some steps you can take to protect your company: </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<ul>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"3\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Use secondary channels to verify requests for changes in account numbers</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"3\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Check the URL included in emails to confirm that it&#8217;s associated with the business it claims to be from</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"3\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Avoid clicking on hyperlinks sent by email and use the official link of the client instead</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"3\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Ensure that employees’ computers have appropriate security standards</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<p><span data-contrast=\"auto\">In conclusion, </span><a href=\"https://fr.namescan.io/freeemailcompromisedcheck\"><span data-contrast=\"none\">business email compromise</span></a><span data-contrast=\"auto\"> is a sophisticated and growing threat to companies around the world. By understanding what BEC is, how it works, and what red flags to watch out for, companies can take proactive measures to protect themselves from this type of cybercrime.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n","protected":false},"excerpt":{"rendered":"<p>A business email compromise is a type of cybercrime that is becoming increasingly prevalent, causing significant financial losses to companies around the world. This sophisticated scam can be difficult to detect and is specifically designed to exploit weaknesses in a company’s internal processes and technology.   Understanding what business email compromise is, how it operates, and [&hellip;]</p>\n","protected":false},"author":2,"featured_media":13008,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"footnotes":""},"categories":[85],"tags":[],"class_list":["post-13006","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-blog-post","post_format-post-format-image"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https://yoast.com/wordpress/plugins/seo/ -->\n<title>Business Email Compromise: Understanding the Threat to Your Business - NameScan Insight</title>\n<meta name=\"description\" content=\"Protect your business from the threat of business email compromise (BEC). Learn how BEC works, its warning signs, and prevention measures.\" />\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" />\n<link rel=\"canonical\" href=\"https://namescan.io/insights/compromised-business-email/\" />\n<meta property=\"og:locale\" content=\"en_US\" />\n<meta property=\"og:type\" content=\"article\" />\n<meta property=\"og:title\" content=\"Business Email Compromise: Understanding the Threat to Your Business - NameScan Insight\" />\n<meta property=\"og:description\" content=\"Protect your business from the threat of business email compromise (BEC). Learn how BEC works, its warning signs, and prevention measures.\" />\n<meta property=\"og:url\" content=\"https://namescan.io/insights/compromised-business-email/\" />\n<meta property=\"og:site_name\" content=\"NameScan Insight\" />\n<meta property=\"article:publisher\" content=\"https://www.facebook.com/namescan.io/\" />\n<meta property=\"article:published_time\" content=\"2023-05-24T05:21:04+00:00\" />\n<meta property=\"article:modified_time\" content=\"2023-06-08T05:53:38+00:00\" />\n<meta property=\"og:image\" content=\"https://namescan.io/insights/wp-content/uploads/2023/06/Business-email-compromise.jpg\" />\n\t<meta property=\"og:image:width\" content=\"1920\" />\n\t<meta property=\"og:image:height\" content=\"1281\" />\n\t<meta property=\"og:image:type\" content=\"image/jpeg\" />\n<meta name=\"author\" content=\"Robin Deane\" />\n<meta name=\"twitter:card\" content=\"summary_large_image\" />\n<meta name=\"twitter:creator\" content=\"@namescan_io\" />\n<meta name=\"twitter:site\" content=\"@namescan_io\" />\n<meta name=\"twitter:label1\" content=\"Written by\" />\n\t<meta name=\"twitter:data1\" content=\"Robin Deane\" />\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" />\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" />\n<script type=\"application/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https://schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https://namescan.io/insights/compromised-business-email/#article\",\"isPartOf\":{\"@id\":\"https://namescan.io/insights/compromised-business-email/\"},\"author\":{\"name\":\"Robin Deane\",\"@id\":\"https://namescan.io/insights/#/schema/person/a065fb2073f7fb34d577c084c03d104f\"},\"headline\":\"Business Email Compromise: Understanding the Threat to Your Business\",\"datePublished\":\"2023-05-24T05:21:04+00:00\",\"dateModified\":\"2023-06-08T05:53:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https://namescan.io/insights/compromised-business-email/\"},\"wordCount\":667,\"commentCount\":0,\"publisher\":{\"@id\":\"https://namescan.io/insights/#organization\"},\"image\":{\"@id\":\"https://namescan.io/insights/compromised-business-email/#primaryimage\"},\"thumbnailUrl\":\"https://namescan.io/insights/wp-content/uploads/2023/06/Business-email-compromise.jpg\",\"articleSection\":[\"Blog Post\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https://namescan.io/insights/compromised-business-email/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https://namescan.io/insights/compromised-business-email/\",\"url\":\"https://namescan.io/insights/compromised-business-email/\",\"name\":\"Business Email Compromise: Understanding the Threat to Your Business - NameScan Insight\",\"isPartOf\":{\"@id\":\"https://namescan.io/insights/#website\"},\"primaryImageOfPage\":{\"@id\":\"https://namescan.io/insights/compromised-business-email/#primaryimage\"},\"image\":{\"@id\":\"https://namescan.io/insights/compromised-business-email/#primaryimage\"},\"thumbnailUrl\":\"https://namescan.io/insights/wp-content/uploads/2023/06/Business-email-compromise.jpg\",\"datePublished\":\"2023-05-24T05:21:04+00:00\",\"dateModified\":\"2023-06-08T05:53:38+00:00\",\"description\":\"Protect your business from the threat of business email compromise (BEC). Learn how BEC works, its warning signs, and prevention measures.\",\"breadcrumb\":{\"@id\":\"https://namescan.io/insights/compromised-business-email/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https://namescan.io/insights/compromised-business-email/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https://namescan.io/insights/compromised-business-email/#primaryimage\",\"url\":\"https://namescan.io/insights/wp-content/uploads/2023/06/Business-email-compromise.jpg\",\"contentUrl\":\"https://namescan.io/insights/wp-content/uploads/2023/06/Business-email-compromise.jpg\",\"width\":1920,\"height\":1281,\"caption\":\"NameScan Compromised Business Email Check\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https://namescan.io/insights/compromised-business-email/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https://namescan.io/insights/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business Email Compromise: Understanding the Threat to Your Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https://namescan.io/insights/#website\",\"url\":\"https://namescan.io/insights/\",\"name\":\"NameScan\",\"description\":\"AML Risk Management and Compliance\",\"publisher\":{\"@id\":\"https://namescan.io/insights/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https://namescan.io/insights/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https://namescan.io/insights/#organization\",\"name\":\"NameScan\",\"url\":\"https://namescan.io/insights/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https://namescan.io/insights/#/schema/logo/image/\",\"url\":\"https://13.239.146.144/wp-content/uploads/2018/06/namescan-banner.png\",\"contentUrl\":\"https://13.239.146.144/wp-content/uploads/2018/06/namescan-banner.png\",\"width\":300,\"height\":100,\"caption\":\"NameScan\"},\"image\":{\"@id\":\"https://namescan.io/insights/#/schema/logo/image/\"},\"sameAs\":[\"https://www.facebook.com/namescan.io/\",\"https://x.com/namescan_io\",\"https://au.linkedin.com/company/namescan.io\",\"https://www.youtube.com/channel/UCDMcXDG7Z965embyyEkWFLA\"]},{\"@type\":\"Person\",\"@id\":\"https://namescan.io/insights/#/schema/person/a065fb2073f7fb34d577c084c03d104f\",\"name\":\"Robin Deane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https://namescan.io/insights/#/schema/person/image/\",\"url\":\"https://secure.gravatar.com/avatar/bf2ac98ea77640521e75b59edf831b32878a6348c6f37398be6698e7eeeb8219?s=96&d=mm&r=g\",\"contentUrl\":\"https://secure.gravatar.com/avatar/bf2ac98ea77640521e75b59edf831b32878a6348c6f37398be6698e7eeeb8219?s=96&d=mm&r=g\",\"caption\":\"Robin Deane\"}}]}</script>\n<!-- / Yoast SEO plugin. -->","yoast_head_json":{"title":"Business Email Compromise: Understanding the Threat to Your Business - NameScan Insight","description":"Protect your business from the threat of business email compromise (BEC). Learn how BEC works, its warning signs, and prevention measures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https://namescan.io/insights/compromised-business-email/","og_locale":"en_US","og_type":"article","og_title":"Business Email Compromise: Understanding the Threat to Your Business - NameScan Insight","og_description":"Protect your business from the threat of business email compromise (BEC). Learn how BEC works, its warning signs, and prevention measures.","og_url":"https://namescan.io/insights/compromised-business-email/","og_site_name":"NameScan Insight","article_publisher":"https://www.facebook.com/namescan.io/","article_published_time":"2023-05-24T05:21:04+00:00","article_modified_time":"2023-06-08T05:53:38+00:00","og_image":[{"width":1920,"height":1281,"url":"https://fr.namescan.io/insights/wp-content/uploads/2023/06/Business-email-compromise.jpg","type":"image/jpeg"}],"author":"Robin Deane","twitter_card":"summary_large_image","twitter_creator":"@namescan_io","twitter_site":"@namescan_io","twitter_misc":{"Written by":"Robin Deane","Est. reading time":"3 minutes"},"schema":{"@context":"https://schema.org","@graph":[{"@type":"Article","@id":"https://namescan.io/insights/compromised-business-email/#article","isPartOf":{"@id":"https://namescan.io/insights/compromised-business-email/"},"author":{"name":"Robin Deane","@id":"https://namescan.io/insights/#/schema/person/a065fb2073f7fb34d577c084c03d104f"},"headline":"Business Email Compromise: Understanding the Threat to Your Business","datePublished":"2023-05-24T05:21:04+00:00","dateModified":"2023-06-08T05:53:38+00:00","mainEntityOfPage":{"@id":"https://namescan.io/insights/compromised-business-email/"},"wordCount":667,"commentCount":0,"publisher":{"@id":"https://namescan.io/insights/#organization"},"image":{"@id":"https://namescan.io/insights/compromised-business-email/#primaryimage"},"thumbnailUrl":"https://namescan.io/insights/wp-content/uploads/2023/06/Business-email-compromise.jpg","articleSection":["Blog Post"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https://namescan.io/insights/compromised-business-email/#respond"]}]},{"@type":"WebPage","@id":"https://namescan.io/insights/compromised-business-email/","url":"https://fr.namescan.io/insights/compromised-business-email/","name":"Business Email Compromise: Understanding the Threat to Your Business - NameScan Insight","isPartOf":{"@id":"https://namescan.io/insights/#website"},"primaryImageOfPage":{"@id":"https://namescan.io/insights/compromised-business-email/#primaryimage"},"image":{"@id":"https://namescan.io/insights/compromised-business-email/#primaryimage"},"thumbnailUrl":"https://namescan.io/insights/wp-content/uploads/2023/06/Business-email-compromise.jpg","datePublished":"2023-05-24T05:21:04+00:00","dateModified":"2023-06-08T05:53:38+00:00","description":"Protect your business from the threat of business email compromise (BEC). Learn how BEC works, its warning signs, and prevention measures.","breadcrumb":{"@id":"https://namescan.io/insights/compromised-business-email/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://namescan.io/insights/compromised-business-email/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https://namescan.io/insights/compromised-business-email/#primaryimage","url":"https://fr.namescan.io/insights/wp-content/uploads/2023/06/Business-email-compromise.jpg","contentUrl":"https://namescan.io/insights/wp-content/uploads/2023/06/Business-email-compromise.jpg","width":1920,"height":1281,"caption":"NameScan Compromised Business Email Check"},{"@type":"BreadcrumbList","@id":"https://namescan.io/insights/compromised-business-email/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://namescan.io/insights/"},{"@type":"ListItem","position":2,"name":"Business Email Compromise: Understanding the Threat to Your Business"}]},{"@type":"WebSite","@id":"https://namescan.io/insights/#website","url":"https://fr.namescan.io/insights/","name":"NameScan","description":"AML Risk Management and Compliance","publisher":{"@id":"https://namescan.io/insights/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://namescan.io/insights/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://namescan.io/insights/#organization","name":"NameScan","url":"https://fr.namescan.io/insights/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://namescan.io/insights/#/schema/logo/image/","url":"https://13.239.146.144/wp-content/uploads/2018/06/namescan-banner.png","contentUrl":"https://13.239.146.144/wp-content/uploads/2018/06/namescan-banner.png","width":300,"height":100,"caption":"NameScan"},"image":{"@id":"https://namescan.io/insights/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/namescan.io/","https://x.com/namescan_io","https://au.linkedin.com/company/namescan.io","https://www.youtube.com/channel/UCDMcXDG7Z965embyyEkWFLA"]},{"@type":"Person","@id":"https://namescan.io/insights/#/schema/person/a065fb2073f7fb34d577c084c03d104f","name":"Robin Deane","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://namescan.io/insights/#/schema/person/image/","url":"https://secure.gravatar.com/avatar/bf2ac98ea77640521e75b59edf831b32878a6348c6f37398be6698e7eeeb8219?s=96&d=mm&r=g","contentUrl":"https://secure.gravatar.com/avatar/bf2ac98ea77640521e75b59edf831b32878a6348c6f37398be6698e7eeeb8219?s=96&d=mm&r=g","caption":"Robin Deane"}}]}},"_links":{"self":[{"href":"https://namescan.io/insights/wp-json/wp/v2/posts/13006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https://namescan.io/insights/wp-json/wp/v2/posts"}],"about":[{"href":"https://namescan.io/insights/wp-json/wp/v2/types/post"}],"author":[{"embeddable":true,"href":"https://namescan.io/insights/wp-json/wp/v2/users/2"}],"replies":[{"embeddable":true,"href":"https://namescan.io/insights/wp-json/wp/v2/comments?post=13006"}],"version-history":[{"count":2,"href":"https://namescan.io/insights/wp-json/wp/v2/posts/13006/revisions"}],"predecessor-version":[{"id":13009,"href":"https://namescan.io/insights/wp-json/wp/v2/posts/13006/revisions/13009"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://namescan.io/insights/wp-json/wp/v2/media/13008"}],"wp:attachment":[{"href":"https://namescan.io/insights/wp-json/wp/v2/media?parent=13006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://namescan.io/insights/wp-json/wp/v2/categories?post=13006"},{"taxonomy":"post_tag","embeddable":true,"href":"https://namescan.io/insights/wp-json/wp/v2/tags?post=13006"}],"curies":[{"name":"wp","href":"https://api.w.org/{rel}","templated":true}]}}