• Register

Subscribe to our blog

CTN Blog

How to Prevent a Business Email Compromise Attack

Did you know? Business email compromise is one of the most common threats today. It employs tactics like impersonating an executive, HR, or a trusted vendor to initiate fraudulent transfers of money. According to the FBI, $1.7 billion was lost to BEC in 2019 alone. Here are tips from the FBI to stay secure:

  • Be Skeptical! Last-minute changes in wiring instructions or recipient account information must be
  • Don’t Click It! Verify any changes and information via the contact on file—do not contact the vendor
    through the number provided in the email.
  • Doublecheck That URL! Ensure the URL in the email is associated with the business it claims to be
  • Spelling Counts! Be alert to misspelled hyperlinks in the actual domain name.
  • It’s a Match! Verify the email address used to send emails, especially when using a mobile or
    handheld device, by ensuring the sender’s email address appears to match who it’s coming from.
  • Pay Attention! Often there are clues with Business Email Compromise:
    • An employee who does not normally interact with the CEO receives an urgent request
      from them.
    • You see data that shows an employee is in one location at 1:00pm but halfway around
      the globe 10 minutes later.
    • You see activity from an employee who is supposed to be on leave.
    • And, As Always, if You See Something, Say Something! If something looks awry, report it to your MSP
      or a supervisor. And if you have been a victim of BEC, file a detailed complaint with

Make sure you’re providing ongoing education to your employees to keep them secure. Print this checklist and post it next to all common areas and workspaces.

CTN Expands its IT Staffing Practice
Reconsidering IT Principles Can Help Push Business...

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

QR Code

Latest News & Events

CTN does not use any SolarWinds or FireEye products. As you’ve likely seen reported, SolarWinds discovered a supply chain attack compromising their Orion business software updates that distributed malware known as SUNBURST. The malware perm...

Latest Blog

The benefits of using an IT staffing firm to fill an employer’s temporary needs cannot be denied. IT staffing services allow for greater flexibility, lower overhead costs, higher quality and quicker hires, just to name a few. Did ...

Contact Us

Learn more about what CTN can do for your business.

Call us today
(610) 828-5500

610 Sentry Parkway
Suite 110
Blue Bell, Pennsylvania 19422