Business Email Compromise (BEC) is a growing threat where criminals gain access to a work email account to deceive individuals into transferring money or stealing sensitive data. These attacks often target senior staff or those who can authorise financial transactions, making them particularly dangerous.
Unfortunately, BEC attacks are on the rise. A recent government report on cyber attacks revealed that in 2023, 84% of businesses and 83% of charities experienced a phishing attack within the past year.
However, there’s good news. The National Cyber Security Centre (NCSC) has published new guidance specifically aimed at helping smaller organisations, which may lack the resources or expertise to fully implement the existing guidance on phishing attacks. This new guidance offers practical steps to reduce the likelihood of falling victim to a BEC attack.
You can read the full blog here
Key Strategies to Protect Against BEC Attacks:
Reduce Your Digital Footprint
Minimising the amount of personal and company information available online can make it harder for criminals to find and use this information in their attacks. Regularly review what information about your organisation is publicly accessible and remove anything unnecessary
Educate Your Staff on BEC
Help your staff to detect phishing emails by providing regular training sessions and resources. Make sure they know the common signs of phishing attempts and understand the importance of verifying the authenticity of emails before taking any action.
Apply the Principle of ‘Least Privilege’
Ensure that employees only have access to the information and systems they need to perform their jobs. This minimises the potential damage if an account is compromised.
Implement 2-Step Verification
Adding an extra layer of security through two-step verification can significantly reduce the risk of unauthorised access to your email accounts. This means even if a password is compromised, an additional verification step is required to gain access.
Steps to Take If Your Email Is Compromised
If you suspect your email account has been compromised or if you’ve been tricked into making a fraudulent payment, it’s crucial to act quickly.
Preparing for the Inevitable
While implementing these steps will reduce the likelihood of BEC attacks, no organisation is completely impervious to all cyber threats. It’s important to plan for potential compromises and practice responding to attacks.
Why Now? Windows 10 is approaching End of Life Microsoft will retire Windows 10 on 14 October 2025, ending free security and feature updates. The
Why should technology leaders care about energy legislation? The UK’s journey toward energy independence and net zero is now inseparable from the nation’s digital
In July 2025, the UK government unveiled a ground-breaking package of measures aimed at disrupting the ransomware economy and protecting vital services. These moves
For all businesses, agility and innovation are essential for staying competitive. But what happens when employees act faster than your IT policy can keep
Artificial Intelligence (AI) is transforming industries by improving efficiency and decision-making. However, cybercriminals are also harnessing AI to create more sophisticated and targeted cyber
For many growing businesses, having access to board-level IT leadership can make the difference between simply maintaining systems and using technology as a driver
In sectors where client trust is everything legal, accountancy, financial services the cost of a cyber breach goes far beyond lost data. It strikes
In today’s rapidly evolving business landscape, relying solely on reactive IT support can hinder your organisation’s growth and resilience. Without a strategic IT roadmap,
How 4th Platform (Powered by Gamma) keeps your business ahead with Cloud Communications. The UK’s analogue phone network is being switched off in 2027, and
Why getting your cloud setup right the first time matters more than you think. Cloud services have revolutionised how modern businesses operate offering flexibility,