Big Data
Cloud Computing
Data Center
Hardware
HR, Finance, Marketing
Internet
IT Management
IT-Security
Mobile
Network
Software
Klient: Proofpoint Ltd
Format: E-bok
Storlek: 2,95 MB
Språk: Engelska
Datum: 13.05.2024
Breaking Down BEC: The Modern CISO's Framework for Identifying, Classifying and Stopping Email Fraud
Business email compromise (BEC), also known as email fraud, is one of cybersecurity's costliest and least understood threats. This fast-growing category of email fraud doesn't always garner as much attention as other high-profile cyber crimes. But in terms of direct financial costs, BEC easily overshadows other types.
In 2020 alone, BEC schemes cost organisations and individuals more than $1.8 billion. That's up more than $100 million from 2019, and it represents 44% of total cyber-crime losses.
As BEC schemes have evolved, industry nomenclature has outlived its usefulness. The terms used to explain BEC tactics and techniques have become ambiguous, conflated with other concepts and misused. Without a framework to describe BEC attacks let alone conceptualise them-researching and managing the threat is difficult, if not impossible.
That's why we have created the Proofpoint Email Fraud Taxonomy. This framework is designed to help security professionals better identify, classify and ultimately block this costly threat.
In 2020 alone, BEC schemes cost organisations and individuals more than $1.8 billion. That's up more than $100 million from 2019, and it represents 44% of total cyber-crime losses.
As BEC schemes have evolved, industry nomenclature has outlived its usefulness. The terms used to explain BEC tactics and techniques have become ambiguous, conflated with other concepts and misused. Without a framework to describe BEC attacks let alone conceptualise them-researching and managing the threat is difficult, if not impossible.
That's why we have created the Proofpoint Email Fraud Taxonomy. This framework is designed to help security professionals better identify, classify and ultimately block this costly threat.