An HR manager receives an email seemingly from an employee who has opened a new bank account. Could she please update the employee’s direct deposit details before the next payday? With a second look, the HR manager realizes the email is a fraud—the sender email doesn’t match the employee’s address. A bad situation averted.
Business email compromise (BEC) and phishing attacks are all too common. The Blackpoint Active-SOC saw over 42,000 BEC attacks in 2023, representing a 210% surge from 2022. And the FBI’s Internet Crime Complaint Center reports that businesses lost a staggering $2.9 billion to BEC scams in 2023.
You might think in 2024, the number one attack vector would be a more advanced one. But Zachary Sherf, Director of CyberSecurity at Lyra Technology Group, says email’s vulnerability lies in users’ comfort with the platform.
“The ultimate threat vector is the human layer. And email has existed so long that it’s built up a level of trust and familiarity that doesn’t exist in other parts of the business,” Sherf says.
That’s why BEC should be a primary consideration when curating the security stack to best protect your clients. But there are prevalent misconceptions surrounding email security, so let’s debunk some of them.