Vulnerabilities in the Home Office

Vulnerabilities in the Home Office

Business Email Compromise (BEC)

With this model, email communication has grown exponentially, so cybercriminals have seen the opportunity to impersonate your fellow suppliers or bosses.

How does it work?

An example of this is the "CEO Fraud" in which a cybercriminal sends an email asking for bank transfers, passwords or confidential documents posing as a director so that the targeted person performs the requested action.

When this happens, the consequences can be extremely serious for the company.

HOME_OFFICE_BLOG