


{"id":97,"date":"2021-07-08T09:34:48","date_gmt":"2021-07-08T09:34:48","guid":{"rendered":"http:\/\/ec2-3-238-44-160.compute-1.amazonaws.com\/?p=97"},"modified":"2021-08-20T07:49:10","modified_gmt":"2021-08-20T07:49:10","slug":"how-to-protect-yourself-from-bec-attacks","status":"publish","type":"post","link":"https:\/\/hellovpn.app\/blog\/how-to-protect-yourself-from-bec-attacks\/","title":{"rendered":"How to protect yourself from BEC attacks"},"content":{"rendered":"\n<p><em>BEC is a sophisticated way of phishing attacks, which does not include only email phishing, but tends to attack social media, mobile devices, etc. Cybercriminals go on targeting global companies with more advanced technologies than ever. How to recognize and protect yourself from <a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\">BEC attacks<\/a>?<\/em><br><br><a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\">Protect yourself from cybercriminals now.<\/a><br><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/ec2-3-238-44-160.compute-1.amazonaws.com\/wp-content\/uploads\/2021\/07\/web-hosting-3Mhgvrk4tjM-unsplash-1024x683.jpeg\" alt=\"\" class=\"wp-image-99\" width=\"504\" height=\"336\" srcset=\"https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/web-hosting-3Mhgvrk4tjM-unsplash-1024x683.jpeg 1024w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/web-hosting-3Mhgvrk4tjM-unsplash-300x200.jpeg 300w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/web-hosting-3Mhgvrk4tjM-unsplash-768x512.jpeg 768w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/web-hosting-3Mhgvrk4tjM-unsplash-1536x1024.jpeg 1536w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/web-hosting-3Mhgvrk4tjM-unsplash.jpeg 1600w\" sizes=\"auto, (max-width: 504px) 100vw, 504px\" \/><\/a><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"1\">INDEX<br><br>1-<meta charset=\"utf-8\"><a href=\"#1\">The definition of BEC<\/a><br>2-<meta charset=\"utf-8\"><a href=\"#2\">BEC\u2019s target companies<\/a><br>3-<meta charset=\"utf-8\"><a href=\"#3\">How to identify and prevent BEC attack<\/a><br><br>The definition of BEC<\/h3>\n\n\n\n<p class=\"has-text-align-left\"><strong>BEC<\/strong> stands for Business Email Compromise. <strong>BEC<\/strong> is a method, which is used by criminals to hack emails of big organizations\/companies, contact employees by pretending to be CEO or someone well-known in the company. There are <a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\">different schemes<\/a> but the most common case is when cybercriminals emailing a person in charge of wire transfer and ask to deposit the money.<\/p>\n\n\n\n<p><strong><em><a href=\"https:\/\/hellovpn.app\/blog\/7-important-things-you-should-know-about-vpns\/\" target=\"_blank\" rel=\"noreferrer noopener\" title=\"https:\/\/hellovpn.app\/blog\/7-important-things-you-should-know-about-vpns\/\">7 Important Things You Should Know About VPNs<\/a><\/em><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"2\">BEC\u2019s target companies<br><\/h3>\n\n\n\n<p>According to <a href=\"https:\/\/gulfnews.com\/technology\/cybercriminals-use-enterprise-based-strategies-for-phishing-1.1572884988007\">Gulfnews<\/a> cybercriminal targeting different industries and their customers globally. The focus industries are high-tech, financial services, e-commerce and media. Their objectives are the biggest world\u2019s brands like <strong>PayPal, Dropbox, Microsoft, DHL<\/strong>.\u00a0<br><br><a href=\"https:\/\/hellovpn.onelink.me\/ba95\/1df7cbad\">Don&#8217;t get trapped by hackers, use this app for absolute protection.<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"3\">How to identify and prevent BEC attack<\/h3>\n\n\n\n<p>Cybercriminals are using different tactics to find the right person to scam. The first alarm is noticing suspicious words like <a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\">\u201curgent\u201d, \u201cpayment\u201d, \u201crequested\u201d<\/a>. The next step is to check the sender\u2019s email address and forward the message, so the address would be double-checked before you reply. The other technique is creating a <strong>unique domain<\/strong> for the company\u2019s mailbox instead of using <strong>online emailing services<\/strong>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/ec2-3-238-44-160.compute-1.amazonaws.com\/wp-content\/uploads\/2021\/07\/taskin-ashiq-_X-f0s20tcM-unsplash-1024x576.jpeg\" alt=\"\" class=\"wp-image-100\" width=\"620\" height=\"348\" srcset=\"https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/taskin-ashiq-_X-f0s20tcM-unsplash-1024x576.jpeg 1024w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/taskin-ashiq-_X-f0s20tcM-unsplash-300x169.jpeg 300w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/taskin-ashiq-_X-f0s20tcM-unsplash-768x432.jpeg 768w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/taskin-ashiq-_X-f0s20tcM-unsplash-1536x864.jpeg 1536w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/taskin-ashiq-_X-f0s20tcM-unsplash.jpeg 1600w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/a><\/figure><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Ransomware\">Ransomware<\/a><\/strong> or <strong>BEC<\/strong> is a very significant cybercrime threat. According to <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/business-email-compromise-(bec)\">Trendmicro<\/a> companies lost in total <strong>140,000 USD<\/strong> in <strong>2016<\/strong> due to such attacks. That\u2019s why neglecting any kind of suspicious activity on your PC or in particular emails or messages, requiring to transfer a certain sum of money, might be dangerous. So beware! You should also join a training course or an educational program (if there is any in your company) on how to detect this kind of threat.<br><br><a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\">Secure way to surf the Web<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BEC is a sophisticated way of phishing attacks, which does not include only email phishing, but tends to attack social media, mobile devices, etc. Cybercriminals go on targeting global companies with more advanced technologies than ever. How to recognize and protect yourself from BEC attacks? Protect yourself from cybercriminals now. INDEX 1-The definition of BEC2-BEC\u2019s [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[36],"class_list":["post-97","post","type-post","status-publish","format-standard","hentry","category-privacy","tag-prevent-bec-attacks"],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/posts\/97","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/comments?post=97"}],"version-history":[{"count":4,"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/posts\/97\/revisions"}],"predecessor-version":[{"id":379,"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/posts\/97\/revisions\/379"}],"wp:attachment":[{"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/media?parent=97"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/categories?post=97"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/tags?post=97"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}