GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Guide to Types 1, 2, 3 & 4 Business Email Compromise Phishing Attacks

  • Author(s):
  • Elaine Dzuba

Your Challenge: Modern fraud and phishing attacks rely on highly targeted, 1:1 social engineering – not malicious links or malware — making these attacks difficult for your email providers and gateways to detect
Traditional SEGs, Office 365, G Suite and other defenses routinely miss over 30% of attack campaigns such as BEC — and create more work for SOC teams

Our Solution: Uniquely stopes all four Gartner-defined BEC phishing types — including Type 3 “long con,” account-takeover BECs and Type 4 supply chain phishing BECs

Provides a unique machine + human approach to Active Fraud Prevention across all threat vectors: email, social, web and network

Extends protection to your trusted partners via partner social graphing to stop BEC fraud in progress

  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Format:
  • Infographic
Topics:
Website:Visit Publisher Website
Publisher:Area 1 Security
Published:January 29, 2021
License:Copyrighted
Copyright:© 2021 Area 1 Security

Featured Content

Contact Publisher

Claim Content