Digital banking for business
Seamlessly access all of your accounts from one place with First Citizens Digital Banking for business.
Bad actors are using increasingly sophisticated tactics to deceive employees into diverting money or exposing sensitive information—with thousands of organizations falling victim to these email scams every year. Here are steps you may take to help protect your organization.
Selecting a link or replying to the wrong email may be an expensive mistake, and plenty of commercial businesses are vulnerable. In fact, the FBI's Internet Crime Complaint Center received more than 21,000 complaints of business email compromise, or BEC, in 2022 alone.
For industrial companies, an email compromise could affect everything regarding operations through the supply chain.
To stem this tidal wave of BEC attacks and safeguard their assets, companies should redouble their business email compromise prevention efforts. This may include educating employees about the numerous types of email scams, enhancing cybersecurity protections and implementing protocols that reduce opportunities for a scammer to fool someone.
As with any type of fraud, understanding the scam is the first step toward successfully preventing it.
Business email compromise is an email-based scam where cybercriminals use several possible methods—including impersonation, account takeover and social engineering—to steal money or extract sensitive information from organizations.
The FBI considers BEC attacks to be one of the most financially damaging online crimes, referring to it as the $50 billion scam because roughly this amount was reported stolen from businesses worldwide between 2013 and 2022. And as technology continues to evolve, new and more sophisticated schemes continue to proliferate, making it increasingly difficult—but far from impossible—to head them off.
The essential premise of a BEC scheme is impersonation—the sender uses technology to impersonate a known contact to gain the recipient's trust. Some scammers do research to be more convincing. Invariably, this sender has a request that involves money or sensitive information, making business email compromise one of the more common avenues for ACH fraud.
Business email compromise scams are constantly evolving. According to the FBI, some of the more common examples include the following.
While the tactics vary from scheme to scheme, all business email compromise scams have the same basic goal—to convince the recipient to divert money or sensitive information toward the scammer.
One common approach is to create a look-alike email address that is remarkably similar to an email address the recipient would typically trust. For example, if your CEO's email address is MsCeo@companynameinc.com, the would-be scammer might send an email from MsCeo@companynaneinc.com. During a busy workday, the subtle difference between the two email addresses may be easy to miss.
In other instances, a criminal might gain access to an employee's login credentials and use their account for fraudulent purposes. For example, they might take over the email of an accounts receivable manager and use it to send out fake invoices to vendors, asking for payments to be sent to a bank account controlled by the scammer.
Often, criminals obtain these email usernames and passwords using common phishing tactics, such as enticing a recipient to click on a link to enter credentials. Scammers may also purchase login information on the dark web or use an algorithm to guess thousands of passwords until it lands on the correct one—underscoring the importance of adhering to best practices for password management.
While these deceptive strategies are becoming increasingly complex BEC attacks may be thwarted through a commitment to staying abreast of the latest scams and an investment in ongoing fraud and cybersecurity awareness training.
When it comes to preventing business email compromise, your employees are typically your first line of defense. Take the time to educate your employees on the threat of BEC, teaching them about the characteristics that often give away an email's bad intent. The following checklist may help employees identify suspicious emails.
A major component of business email compromise training involves coaching employees on how to double-check financial requests—for example, ensuring that invoice addresses are correct, amounts are cross-referenced and the recipient is who they claim to be.
When an email involves a financial transaction or request to share sensitive information, it's essential that it be verified. Encourage employees to confirm the legitimacy of the request by contacting the sender using previously known contact information. It's also wise to institute a policy that puts two pairs of eyes on every financial transaction to verify details.
To help prevent BEC attacks, every person on staff must make it their business to keep the company safe. This includes using passwords that are strong and unique, setting up multi-factor authentication, or MFA, and not using personal email accounts, which may make it all too easy for a fraudster to spoof an email address.
As part of your company's risk management efforts, you may also consider evaluating the benefits of cybersecurity insurance. Given how widespread cyberattacks have become, cybersecurity insurance may be a sound investment for many organizations—particularly those that store customer data, intellectual property or sensitive information.
A well-built cybersecurity program isn't something that begins and ends in the IT department. Instead, strong cybersecurity requires a set of protocols that permeate the entire organization.
In the years to come, business email compromise will almost certainly continue to be a threat to companies around the globe. But with the right training and internal procedures, organizations may greatly reduce the likelihood of BEC attacks—while also protecting themselves from other cybersecurity events, including costly data breaches.
No matter how complex these schemes become, the best means of beating them remains the same—encouraging your staff to stay vigilant.
Email Us
Please select the option that best matches your needs.
Customers with account-related questions who aren't enrolled in Digital Banking or who would prefer to talk with someone can call us directly.