Shifting tactics fuel surge in business email compromise
In this eye-opening Microsoft Security Insider article, explore the shifting tactics employed by cybercriminals in business email compromise attacks. Read "Shifting tactics fuel surge in business email compromise" to gain valuable insights into cybercriminals' strategies, techniques and motivations. Discover three steps you need to take to fortify defenses and mitigate potential risks. Knowledge is power. Build yours with this 9-minute read. Start now.
What is Business Email Compromise (BEC)?
Business Email Compromise (BEC) is a type of cybercrime where attackers use deceptive tactics to manipulate individuals into providing sensitive information or transferring funds. The FBI reported over 21,000 complaints related to BEC, with adjusted losses exceeding $2.7 billion. Attackers often exploit social engineering techniques, targeting executives, finance managers, and human resources staff, to trick victims into acting on fraudulent requests.
How are cybercriminals evolving their tactics?
Cybercriminals are increasingly using sophisticated tactics, such as leveraging residential IP addresses to make their attacks appear local. This approach helps them bypass detection systems that flag unusual login locations, known as 'impossible travel' alerts. Microsoft has noted a 38% increase in Cybercrime-as-a-Service (CaaS) targeting business email from 2019 to 2022, indicating a shift towards more organized and industrial-scale operations.
What measures can organizations take to protect against BEC?
Organizations can adopt several strategies to protect against BEC, including implementing strong authentication methods like multifactor authentication (MFA), training employees to recognize fraudulent emails, and establishing clear policies for handling financial requests. Additionally, using a secure email solution with advanced phishing protection and adopting a domain-based message authentication policy can significantly enhance security.

Shifting tactics fuel surge in business email compromise
published by Alinco IT
You want a total technology provider, but you need a technology difference. Enter Alinco IT, Inc. We offer strong online capabilities and the dedication to go above and beyond in the design, delivery, maintenance, and monitoring of your IT. Acting as supplement and complement to your own IT department, we improve your organizational performance and business outcomes via innovative, cost-effective solutions for:
- Professional Services, including managed services, Help Desk, networking, and our new I2 program
- Cloud, including ASP and web hosting
- Hardware and software procurement of more than 100,000 brand name products at competitive prices
Committed to industry best practices and customer transparency, Alinco IT, Inc. supports all industries while offering significant expertise in Manufacturing, DOD, Printing, and SMB. We’ve been in business since 1984 and are second-generation minority owned. Most important, we are here for your long-term success—and we have proof. Our average customer tenure is nearly five years, and many have stayed with us for 20 or more.
Contact us today at www.alincoIT.com