Skip links

Your supplier’s BEC problem is your BEC problem

Your supplier’s BEC problem is your BEC problem

Are you protected against scams involving business email compromise (BEC)? In a recent interview with Help Net Security, apexanalytix SVP Danny Thompson takes a deep dive into BEC and discusses what you can do to protect your company from this type of costly payment fraud. A few highlights from his interview:

• BEC scams typically involve supplier spoofing, executive spoofing, credential harvesting, or exploitation of user IDs and email addresses.

• Perpetrators can be either insiders or third parties who gain access to accounts receivable or payable records through systems used by you or your suppliers. Once inside, they change the bank account receiving payments.

• To protect against BEC losses, Thompson recommends automated controls. One example: Real-time bank account ownership validation solutions can confirm whether the owner of a payee bank account is your supplier or a scam artist.

We use cookies on this site to enhance your user experience.
By clicking any link on this page you are giving your consent for us to set cookies. No, give me more info.