Business Email Compromise (BEC) attacks are rising • Blisstech Solutions

BEC attacks illustrated. Image of a hacker standing behind a computer looking menacing

Business Email Compromise (BEC) has emerged as a significant threat to businesses worldwide in recent years. As of March 2025, there has been a staggering 30% increase in BEC attacks. In late February 2025, Microsoft Defender identified nearly 2 million phishing emails related to common BEC themes, averaging over 140,000 daily. The FBI reports BEC is among the most costly cyber threats, causing global losses over $50 billion.

What is BEC?

BEC is a sophisticated scam where cybercriminals use email to trick individuals into sending money or sharing confidential information. These emails often ‘appear’ to come from trusted sources, like company executives or known vendors, making the request appear legitimate.

Cybercriminals use different techniques to conduct BEC attacks. Typical methods involve sending false invoices, spoofing the email addresses of executives and managers, and hacking email accounts to request payments to fraudulent accounts. These techniques depend significantly on social engineering, making them challenging to identify.

The main goal of BEC attacks is financial gain. Cybercriminals seek to steal money or sensitive information for further scams. Remote working has increased BEC attacks by providing more opportunities to exploit vulnerabilities.

Protecting Your Business

Businesses can take several steps to protect themselves from BEC attacks. It is crucial to educate employees about cyber threats and how to identify suspicious emails. Strong security measures, such as multi-factor authentication and regular security training, can also help mitigate the risk. Additionally, businesses should monitor their networks for signs of compromise and have a response plan in place to deal with potential attacks.

If you would like to know more about protecting your business from the ever-growing threat of cyber attacks, please get in touch.

 

More Content

A woman on a laptop with a shield and lock on the screen

Why you should use a password manager

Introduction It can be difficult to keep track of all of your online passwords, especially if you have multiple accounts for different purposes.  But did you know that there is a way to keep all of your passwords safe and secure? A password manager such as LastPass...

Global State of Ransomware Report 2020

Datto have released their annual Global State of the Channel Ransomware Report for 2020. They have interviewed more than 1000 managed service providers (MSPs) around the world. The report gives details on the state of ransomware from the perspective of the...

Tech Tip: How to Stay Cyber Safe at Christmas

CHRISTMAS SPECIAL!!! As we are on the countdown to Christmas, today's Tuesday Two Minute Tech Tip is on a (very tenuous) Christmas theme. As we all get ready for the big day we will be thinking of having a few days or even weeks off work and relaxing. Christmas is a...

Charging in public places? Watch out for “juice jacking”

Airports, hotels, cafés, even shopping centres, offer public charging points where you can boost your phone or laptop battery on the go. They’ve been in the news after the FBI recently tweeted advice to stop using them. Crooks have figured out how to hijack USB ports to install malware and monitoring software onto devices as they charge. The security risk …
Read More

Don’t forget your phone when you think about cyber security

Our phones are a goldmine of private information. If they’re not as secure your other devices, they can become a gaping hole in your cyber security

Microsoft’s fixing this annoying Windows 11 fault

Microsoft’s fixing this annoying Windows 11 fault

Fed up seeing useless “Recommendations” in the Windows 11 Start menu? Good news – Microsoft’s making them more helpful. Here’s how the improvements could help your team save time…

Tech Tip: How to Sync Teams Files to Your Computer

Hello everyone, welcome to a new Tuesday Two Minute Tech Tip.    👉 Do you use Microsoft 365?    👉 Do you need to collaborate on documents with your colleagues?    👉 Do you want to do this using the same familiar Windows...

Tech Tip: How to use Mail Merge

This Tuesday Two Minute Tech-tip shows you how to automate customised emails and letters using Mail Merge. Imagine; you need to send a letter or email to 10s, or even 100s of people with the same base content, but personalised for each recipient. You could manually...
Beware these common ‘malvertising’ attacks

Beware these common ‘malvertising’ attacks

Ever clicked an online ad and wondered afterwards if it was a scam?… most of us have – and cyber criminals want us to keep doing it. Here’s what to look out for to stop your business’s data (and profits) falling into the wrong hands…

Passkeys will be better integrated in Windows

Passkeys will be better integrated in Windows

Big changes are coming to Windows 11 to make logging in safer and easier. Which is why now’s the time to get ready for a password-free future…

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05