{"id":759,"date":"2023-10-12T09:00:00","date_gmt":"2023-10-12T01:00:00","guid":{"rendered":"https:\/\/lookafter.com\/blog\/?p=759"},"modified":"2023-08-29T11:41:31","modified_gmt":"2023-08-29T03:41:31","slug":"email-fraud-unveiling-business-email-compromise-bec","status":"publish","type":"post","link":"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/","title":{"rendered":"Email Fraud: Unveiling Business Email Compromise (BEC)"},"content":{"rendered":"\n<p><a href=\"https:\/\/lookafter.com\/blog\/\">Home<\/a> > <a href=\"https:\/\/lookafter.com\/blog\/category\/empowering-tips\/\">Empowering Tips<\/a> > Email Fraud: Unveiling Business Email Compromise (BEC)<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-bm2th3z \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-bm2th3z button-1\" data-id=\"eb-advance-heading-bm2th3z\"><h1 class=\"eb-ah-title\">Email Fraud: Unveiling Business Email Compromise (BEC)<\/h1><p class=\"eb-ah-subtitle\">October 12, 2023<\/p><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35-1024x538.jpg\" alt=\"\" class=\"wp-image-760\" srcset=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35-1024x538.jpg 1024w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35-300x158.jpg 300w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35-150x79.jpg 150w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35-768x403.jpg 768w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35-360x189.jpg 360w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In today&#8217;s digital landscape, businesses face an ever-increasing threat from cybercriminals seeking to exploit vulnerabilities and gain illicit financial advantage. Among the many nefarious tactics employed by these malicious actors, <strong>Business Email Compromise (BEC)<\/strong> stands out as a particularly cunning and devastating form of cyber fraud.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"root-eb-toc-rvwj6ms wp-block-essential-blocks-table-of-contents wp-block-essential-blocks-table-of-contents\"><div class=\"eb-parent-wrapper eb-parent-eb-toc-rvwj6ms \"><div class=\"eb-toc-container eb-toc-rvwj6ms  eb-toc-is-not-sticky eb-toc-collapsible eb-toc-initially-not-collapsed eb-toc-scrollToTop style-1 list-style-none\" data-scroll-top=\"false\" data-scroll-top-icon=\"fas fa-angle-up\" data-collapsible=\"true\" data-sticky-hide-mobile=\"false\" data-sticky=\"false\" data-scroll-target=\"scroll_to_toc\" data-copy-link=\"false\" data-editor-type=\"\" data-hide-desktop=\"false\" data-hide-tab=\"false\" data-hide-mobile=\"false\" data-itemCollapsed=\"false\" data-highlight-scroll=\"false\"><div class=\"eb-toc-header\"><h2 class=\"eb-toc-title\">Table of Contents<\/h2><\/div><div class=\"eb-toc-wrapper \" data-headers=\"[{&quot;level&quot;:2,&quot;content&quot;:&quot;What is BEC&quot;,&quot;text&quot;:&quot;What is BEC&quot;,&quot;link&quot;:&quot;what-is-bec&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;Types of BEC Attacks&quot;,&quot;text&quot;:&quot;Types of BEC Attacks&quot;,&quot;link&quot;:&quot;types-of-bec-attacks&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;Preventing BEC: Best Practices&quot;,&quot;text&quot;:&quot;Preventing BEC: Best Practices&quot;,&quot;link&quot;:&quot;preventing-bec-best-practices&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;Summary&quot;,&quot;text&quot;:&quot;Summary&quot;,&quot;link&quot;:&quot;summary&quot;}]\" data-visible=\"[false,true,false,true,false,false]\" data-delete-headers=\"[{&quot;label&quot;:&quot;What is BEC&quot;,&quot;value&quot;:&quot;what-is-bec&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;Types of BEC Attacks&quot;,&quot;value&quot;:&quot;types-of-bec-attacks&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;Preventing BEC: Best Practices&quot;,&quot;value&quot;:&quot;preventing-bec-best-practices&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;Summary&quot;,&quot;value&quot;:&quot;summary&quot;,&quot;isDelete&quot;:false}]\" data-smooth=\"true\" data-top-offset=\"\"><div class=\"eb-toc__list-wrap\"><ul class='eb-toc__list'><li><a href=\"#what-is-bec\">What is BEC<\/a><li><a href=\"#types-of-bec-attacks\">Types of BEC Attacks<\/a><li><a href=\"#preventing-bec-best-practices\">Preventing BEC: Best Practices<\/a><li><a href=\"#summary\">Summary<\/a><\/ul><\/div><\/div><\/div><\/div><\/div>\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What is BEC<\/h2>\n\n\n\n<p>Business Email Compromise (BEC) is a type of cybercrime in which attackers gain unauthorized access to a business email account, typically belonging to a high-ranking executive or an employee with financial authority. The primary objective of BEC is to deceive the victim and manipulate them into performing fraudulent actions or sharing sensitive information.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Types of BEC Attacks<\/h2>\n\n\n\n<p>BEC attacks are usually sophisticated and well-planned, often involving <a href=\"https:\/\/lookafter.com\/blog\/what-is-social-engineering-recognizing-psychological-hacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">social engineering techniques<\/a> to trick victims. The attackers may employ various tactics such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Spoofing:<\/strong> The attacker <a href=\"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/\" target=\"_blank\" rel=\"noreferrer noopener\">spoofs the email address<\/a> of a trusted individual within the organization or a reputable entity to make it appear legitimate.<\/li>\n\n\n\n<li><strong>Phishing: <\/strong>The attacker sends fraudulent emails to employees, pretending to be a trusted source, and requests sensitive information or instructs them to perform certain actions.<\/li>\n\n\n\n<li><strong>Executive Impersonation: <\/strong>The attacker impersonates a high-ranking executive within the organization, usually targeting employees responsible for financial transactions. They may request urgent wire transfers or changes to account details.<\/li>\n\n\n\n<li><strong>Vendor Fraud: <\/strong>The attacker poses as a vendor or supplier and sends fake invoices or payment requests to the organization, aiming to redirect funds to their accounts. <\/li>\n\n\n\n<li><strong>Account Compromise: <\/strong>The attacker gains unauthorized access to an employee&#8217;s email account and monitors their communications to identify opportunities for fraudulent activities.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Preventing BEC: Best Practices<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Educate Employees: <\/strong>Provide comprehensive training to employees about the risks and characteristics of BEC attacks. Teach them to recognize suspicious emails, verify sender identities, and exercise caution when handling financial transactions or sensitive information.<\/li>\n\n\n\n<li><strong>Strengthen Email Security:<\/strong> Deploy email filtering systems that can identify and block suspicious emails, including those with spoofed or suspicious sender addresses. Advanced threat protection solutions can help detect and prevent phishing attempts.<\/li>\n\n\n\n<li><strong>Verify Payment Requests: <\/strong>Establish a strict process for validating payment requests, especially those involving significant amounts or changes to account details. Implement a system of dual approval and establish alternative communication channels to verify such requests directly with the concerned parties.<\/li>\n\n\n\n<li><strong>Be Wary of Urgency:<\/strong> Exercise caution when receiving emails with urgent requests for wire transfers or immediate action. Encourage employees to independently verify such requests through a different means of communication (e.g., phone call) before taking any action.<\/li>\n\n\n\n<li><strong>Keep Software Updated:<\/strong> Regularly update and patch all software and systems, including email software and security tools. This helps to address any known vulnerabilities that attackers may exploit.<\/li>\n\n\n\n<li><strong>Maintain Strong Passwords: <\/strong>Encourage the use of strong, unique passwords for email accounts and other systems. Consider implementing a password management solution to facilitate secure password practices.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<p>The consequences of a Business Email Compromise (BEC) attack can be severe, resulting in significant financial losses, reputational damage, and potential legal ramifications for organizations. Thus, it is important to employ preventive measures such as employee awareness training, email filtering systems, and secure communication protocols to help mitigate the risk of BEC attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find out about the sophisticated cyber threat that deceives businesses through email scams, causing financial losses and reputational damage.<\/p>\n","protected":false},"author":1,"featured_media":760,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[6],"tags":[16,17],"class_list":["post-759","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-empowering-tips","tag-email","tag-security-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Email Fraud: Unveiling Business Email Compromise (BEC)<\/title>\n<meta name=\"description\" content=\"Find out about the sophisticated cyber threat that deceives businesses through email scams, causing financial losses and reputational damage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Email Fraud: Unveiling Business Email Compromise (BEC)\" \/>\n<meta property=\"og:description\" content=\"Find out about the sophisticated cyber threat that deceives businesses through email scams, causing financial losses and reputational damage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/\" \/>\n<meta property=\"og:site_name\" content=\"Lookafter Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lookafterit\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-12T01:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/\"},\"author\":{\"name\":\"webmaster\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\"},\"headline\":\"Email Fraud: Unveiling Business Email Compromise (BEC)\",\"datePublished\":\"2023-10-12T01:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/\"},\"wordCount\":542,\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35.jpg\",\"keywords\":[\"Email\",\"Security &amp; Privacy\"],\"articleSection\":[\"Empowering Tips\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/\",\"url\":\"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/\",\"name\":\"Email Fraud: Unveiling Business Email Compromise (BEC)\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35.jpg\",\"datePublished\":\"2023-10-12T01:00:00+00:00\",\"description\":\"Find out about the sophisticated cyber threat that deceives businesses through email scams, causing financial losses and reputational damage.\",\"breadcrumb\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/#primaryimage\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35.jpg\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Email Fraud: Unveiling Business Email Compromise (BEC)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lookafter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Email Fraud: Unveiling Business Email Compromise (BEC)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lookafter.com\/blog\/#website\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"name\":\"Lookafter Blog\",\"description\":\"We look after your email &amp; web, so you can focus on your business.\",\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lookafter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\",\"name\":\"Lookafter Blog\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"width\":1200,\"height\":400,\"caption\":\"Lookafter Blog\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lookafterit\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\",\"name\":\"webmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"caption\":\"webmaster\"},\"sameAs\":[\"https:\/\/lookafter.com\/blog\"],\"url\":\"https:\/\/lookafter.com\/blog\/author\/webmaster\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Email Fraud: Unveiling Business Email Compromise (BEC)","description":"Find out about the sophisticated cyber threat that deceives businesses through email scams, causing financial losses and reputational damage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/","og_locale":"en_US","og_type":"article","og_title":"Email Fraud: Unveiling Business Email Compromise (BEC)","og_description":"Find out about the sophisticated cyber threat that deceives businesses through email scams, causing financial losses and reputational damage.","og_url":"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/","og_site_name":"Lookafter Blog","article_publisher":"https:\/\/www.facebook.com\/lookafterit","article_published_time":"2023-10-12T01:00:00+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35.jpg","type":"image\/jpeg"}],"author":"webmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"webmaster","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/#article","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/"},"author":{"name":"webmaster","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606"},"headline":"Email Fraud: Unveiling Business Email Compromise (BEC)","datePublished":"2023-10-12T01:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/"},"wordCount":542,"publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"image":{"@id":"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35.jpg","keywords":["Email","Security &amp; Privacy"],"articleSection":["Empowering Tips"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/","url":"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/","name":"Email Fraud: Unveiling Business Email Compromise (BEC)","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/#primaryimage"},"image":{"@id":"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35.jpg","datePublished":"2023-10-12T01:00:00+00:00","description":"Find out about the sophisticated cyber threat that deceives businesses through email scams, causing financial losses and reputational damage.","breadcrumb":{"@id":"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/#primaryimage","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35.jpg","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/08\/35.jpg","width":1200,"height":630,"caption":"Email Fraud: Unveiling Business Email Compromise (BEC)"},{"@type":"BreadcrumbList","@id":"https:\/\/lookafter.com\/blog\/email-fraud-unveiling-business-email-compromise-bec\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lookafter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Email Fraud: Unveiling Business Email Compromise (BEC)"}]},{"@type":"WebSite","@id":"https:\/\/lookafter.com\/blog\/#website","url":"https:\/\/lookafter.com\/blog\/","name":"Lookafter Blog","description":"We look after your email &amp; web, so you can focus on your business.","publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lookafter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lookafter.com\/blog\/#organization","name":"Lookafter Blog","url":"https:\/\/lookafter.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","width":1200,"height":400,"caption":"Lookafter Blog"},"image":{"@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lookafterit"]},{"@type":"Person","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606","name":"webmaster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","caption":"webmaster"},"sameAs":["https:\/\/lookafter.com\/blog"],"url":"https:\/\/lookafter.com\/blog\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/759","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/comments?post=759"}],"version-history":[{"count":7,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/759\/revisions"}],"predecessor-version":[{"id":770,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/759\/revisions\/770"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media\/760"}],"wp:attachment":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media?parent=759"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/categories?post=759"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/tags?post=759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}