{"id":6741,"date":"2016-09-12T09:44:39","date_gmt":"2016-09-11T23:44:39","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=6741"},"modified":"2016-09-12T09:44:39","modified_gmt":"2016-09-11T23:44:39","slug":"business-e-mail-compromise-bec","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec","title":{"rendered":"Business E-mail Compromise: Keeping Your Business Safe from BEC"},"content":{"rendered":"<p><strong>Be really careful when you next get a message from your CEO, even if it&#8217;s from a legitimate address.<\/strong> It may not be from who you think it is.<\/p>\n<p>Over the last year and a half, small\u00a0to large businesses have been <a href=\"http:\/\/krebsonsecurity.com\/2016\/04\/fbi-2-3-billion-lost-to-ceo-email-scams\/\">hit hard<\/a> by Business E-mail Compromise (BEC), also known as &#8216;CEO fraud&#8217;.<\/p>\n<p>BEC scams commonly involve targeting specific employees of an organization that appears to be from their CEO, asking for a wire transfer of funds to a nominated recipient. If you&#8217;ve got a\u00a0Chief Financial Officer (CFO), they&#8217;re most at risk of this sort of scam.<\/p>\n<p><!--more--><\/p>\n<h2>How Does BEC Happen?<\/h2>\n<p><strong>First, hackers compromise the CEO&#8217;s e-mail through phishing.<\/strong> If they can&#8217;t get your domain name, they&#8217;ll use a very similar one.<\/p>\n<p>For example, if your company&#8217;s domain name was &#8220;example.com&#8221;, they might register &#8220;examp1e.com&#8221; and send it to you. And if you&#8217;re a skim reader, you might miss it.<\/p>\n<p>Frequent targets of BEC\u00a0are organizations that regularly perform wire transfer payment. However, the fraudsters will usually use the method most commonly associated with your business&#8217;s normal practices, even if this is check.<\/p>\n<p><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/c04bfc89-6d90-4985-adfc-f7d81968bf8b.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6750 size-full\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/c04bfc89-6d90-4985-adfc-f7d81968bf8b.jpeg\" alt=\"BEC example\" width=\"500\" height=\"340\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/c04bfc89-6d90-4985-adfc-f7d81968bf8b.jpeg 500w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/c04bfc89-6d90-4985-adfc-f7d81968bf8b-300x204.jpeg 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>If you&#8217;re hoping your spam filters will protect you against BEC, think again. It slips right through because thee e-mail is not\u00a0mass-mailed and targets a specific person. What&#8217;s more, it&#8217;s usually using a legitimate address. There&#8217;s no malware attached; only instructions.<\/p>\n<p>Some individuals reported being a victim of Scareware or <a href=\"https:\/\/www.backupassist.com\/blog\/news\/ransomware-play-safe-or-pay-up\/\">Ransomware<\/a> intrusions immediately before a BEC\u00a0scam occured.<\/p>\n<p><a href=\"https:\/\/www.fbi.gov\/news\/stories\/business-e-mail-compromise\">The FBI reports<\/a> it has seen a 270%\u00a0increase in BEC scams since January 2015. It said from October 2013 to February 2016, losses have exceeded USD 2.3 billion.<\/p>\n<figure id=\"attachment_6747\" aria-describedby=\"caption-attachment-6747\" style=\"width: 614px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/unmasking-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-6747\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/unmasking-2.png\" alt=\"BEC Attempt Example\" width=\"624\" height=\"491\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/unmasking-2.png 1808w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/unmasking-2-300x236.png 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/unmasking-2-768x604.png 768w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/unmasking-2-1024x805.png 1024w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/a><figcaption id=\"caption-attachment-6747\" class=\"wp-caption-text\"><em><strong>Be Alert:<\/strong> Here you can see the address is made to look like the real one, with a single letter added.<\/em><\/figcaption><\/figure>\n<h2>The Hackers Get To Know You<\/h2>\n<p><strong>The real problem with a BEC scam\u00a0is that the perpetrators\u00a0get to know your business before they strike.\u00a0<\/strong>They research the target organization&#8217;s relationships, activities, interests, and travel or purchasing plans.<\/p>\n<p>They pull this off by scraping employee email addresses and information from your website. If they&#8217;ve got access to your inboxes, they&#8217;ll read all your mail before cooking up an e-mail, searching in particular for words to do with invoices, deposits, and your business infrastructure.<\/p>\n<p>Some BEC scammers will even go a step further and look for companies that have seen a change in leadership in the finance section, companies where executives are travelling, or by leading an investor conference call.<\/p>\n<p>On average, the <a href=\"https:\/\/www.ic3.gov\/media\/2016\/160614.aspx\">FBI estimates<\/a> an organization hit with BEC\u00a0attacks lose between $25,000 and $75,000. Some attacks, however, have cost the victim companies millions or tens of millions of dollars.<\/p>\n<figure id=\"attachment_6748\" aria-describedby=\"caption-attachment-6748\" style=\"width: 606px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/unmasking-1-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-6748\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/unmasking-1-1.png\" alt=\"BEC attack via Spoofing\" width=\"616\" height=\"305\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/unmasking-1-1.png 1268w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/unmasking-1-1-300x149.png 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/unmasking-1-1-768x380.png 768w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/unmasking-1-1-1024x507.png 1024w\" sizes=\"auto, (max-width: 616px) 100vw, 616px\" \/><\/a><figcaption id=\"caption-attachment-6748\" class=\"wp-caption-text\"><em><strong>Spoofed E-mail:<\/strong> Here, you can see the e-mail clearly didn&#8217;t come from the right source.<\/em><\/figcaption><\/figure>\n<h2><\/h2>\n<h2>What Can I Do To Protect My Business Against BEC Scams?<\/h2>\n<p><strong>The best safeguard against a BEC scam is\u00a0education. <\/strong>Train your staff in noticing the signs that might indicate a scam is taking place.<\/p>\n<p>Here&#8217;s what else you can do:<\/p>\n<ul>\n<li><strong>Be Suspicious: <\/strong>Asking for clarification, forwarding an e-mail to IT, or checking with a colleague is all better than having to admit you transferred tens of thousands of dollars to a fake offshore company.<\/li>\n<li><strong>Trust Your Instincts:<\/strong> If it feels like something is up, then it probably is.<\/li>\n<li><strong>Slow Down:\u00a0<\/strong>BEC scammers\u00a0often hit your business at the busiest time of the day. There&#8217;s a good reason for it; they want you to make a snap decision.<\/li>\n<li><strong>Check the Domain and Reply-to Fields: <\/strong>Even if it&#8217;s often hard to see, the moment you hit &#8216;Reply&#8217; the real address of the e-mail will show up. This will give a good indication if the e-mail came from a legitimate source. Also check for domain names with typos in it.<\/li>\n<li><strong>Beware of Personal Accounts:\u00a0<\/strong>If the e-mail is from a personal account\u2014e.g. &#8220;CEOName@gmail.com&#8221;\u2014be very suspicious. Not only is it bad practice to use a personal e-mail for work, it&#8217;s also a big warning sign a BEC scam is taking place.<\/li>\n<li><b>Non-Email Authentication:\u00a0<\/b>Make sure when a transaction is taking place, there is a non-email form of authentication. This might be an in person or over the phone request by the CEO so you know they&#8217;re really the ones requesting it.<\/li>\n<\/ul>\n<p><strong>Once you&#8217;re secure that everyone knows about the threat of BEC scams, make sure your business is insulated from Ransomware as well\u2014they are often performed alongside each other.<\/strong> Make sure all your business&#8217;s data is properly backed up with reliable backup and recovery software like <a href=\"https:\/\/www.backupassist.com\/backupassist.html\">BackupAssist<\/a>. (You can download the <a href=\"https:\/\/www.backupassist.com\/BackupAssist\/download2.php\">free 30-day trial<\/a> here)<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Be really careful when you next get a message from your CEO, even if it&#8217;s from a legitimate address. It may not be from who you think it is. Over the last year and a half, small\u00a0to large businesses have been hit hard by Business E-mail Compromise (BEC), also known as &#8216;CEO fraud&#8217;. BEC scams &#8230; <a title=\"Business E-mail Compromise: Keeping Your Business Safe from BEC\" class=\"read-more\" href=\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec\">Read more <span class=\"screen-reader-text\">Business E-mail Compromise: Keeping Your Business Safe from BEC<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":6749,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,23],"tags":[484,485,486,419,167],"class_list":["post-6741","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interest","category-news","tag-bec","tag-business-e-mail-compromise","tag-ceo","tag-fbi","tag-hackers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Business E-mail Compromise: Keep Your Business Safe (BEC)<\/title>\n<meta name=\"description\" content=\"Over the last year and a half, medium to large businesses have been hit hard by Business E-mail Compromise (BEC), also known as &#039;CEO fraud&#039;. (Read More)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business E-mail Compromise: Keep Your Business Safe (BEC)\" \/>\n<meta property=\"og:description\" content=\"Over the last year and a half, medium to large businesses have been hit hard by Business E-mail Compromise (BEC), also known as &#039;CEO fraud&#039;. (Read More)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-11T23:44:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/man-in-shadow-e1472527750514.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"570\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adam Ipsen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Ipsen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec\"},\"author\":{\"name\":\"Adam Ipsen\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d\"},\"headline\":\"Business E-mail Compromise: Keeping Your Business Safe from BEC\",\"datePublished\":\"2016-09-11T23:44:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec\"},\"wordCount\":787,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/man-in-shadow-e1472527750514.jpg\",\"keywords\":[\"BEC\",\"Business E-mail Compromise\",\"CEO\",\"FBI\",\"hackers\"],\"articleSection\":[\"Interest\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec\",\"url\":\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec\",\"name\":\"Business E-mail Compromise: Keep Your Business Safe (BEC)\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/man-in-shadow-e1472527750514.jpg\",\"datePublished\":\"2016-09-11T23:44:39+00:00\",\"description\":\"Over the last year and a half, medium to large businesses have been hit hard by Business E-mail Compromise (BEC), also known as 'CEO fraud'. (Read More)\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/man-in-shadow-e1472527750514.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/man-in-shadow-e1472527750514.jpg\",\"width\":1000,\"height\":570,\"caption\":\"BEC shadow CEO\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business E-mail Compromise: Keeping Your Business Safe from BEC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d\",\"name\":\"Adam Ipsen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g\",\"caption\":\"Adam Ipsen\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/adam-ipsen\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Business E-mail Compromise: Keep Your Business Safe (BEC)","description":"Over the last year and a half, medium to large businesses have been hit hard by Business E-mail Compromise (BEC), also known as 'CEO fraud'. (Read More)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec","og_locale":"en_US","og_type":"article","og_title":"Business E-mail Compromise: Keep Your Business Safe (BEC)","og_description":"Over the last year and a half, medium to large businesses have been hit hard by Business E-mail Compromise (BEC), also known as 'CEO fraud'. (Read More)","og_url":"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec","og_site_name":"Cyber Resilience Blog","article_published_time":"2016-09-11T23:44:39+00:00","og_image":[{"width":1000,"height":570,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/man-in-shadow-e1472527750514.jpg","type":"image\/jpeg"}],"author":"Adam Ipsen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adam Ipsen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec"},"author":{"name":"Adam Ipsen","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d"},"headline":"Business E-mail Compromise: Keeping Your Business Safe from BEC","datePublished":"2016-09-11T23:44:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec"},"wordCount":787,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/man-in-shadow-e1472527750514.jpg","keywords":["BEC","Business E-mail Compromise","CEO","FBI","hackers"],"articleSection":["Interest","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec","url":"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec","name":"Business E-mail Compromise: Keep Your Business Safe (BEC)","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/man-in-shadow-e1472527750514.jpg","datePublished":"2016-09-11T23:44:39+00:00","description":"Over the last year and a half, medium to large businesses have been hit hard by Business E-mail Compromise (BEC), also known as 'CEO fraud'. (Read More)","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/man-in-shadow-e1472527750514.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/08\/man-in-shadow-e1472527750514.jpg","width":1000,"height":570,"caption":"BEC shadow CEO"},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/business-e-mail-compromise-bec#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Business E-mail Compromise: Keeping Your Business Safe from BEC"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d","name":"Adam Ipsen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g","caption":"Adam Ipsen"},"url":"https:\/\/www.backupassist.com\/blog\/author\/adam-ipsen"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/6741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=6741"}],"version-history":[{"count":0,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/6741\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/6749"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=6741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=6741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=6741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}