Skip to main content

Business Email Compromise

Because business email compromise (BEC) often relies on social engineering, people are as important as technology in preventing losses from BEC.

360° Cyber Protection

BEC attacks usually involve social engineering techniques. Most often, a cybercriminal uses stolen email credentials or a spoofed email address that looks like a trusted address. The goal is to trick an employee into bypassing normal procedures to steal money or gain access to valuable assets. The cybercriminal may steal funds, by misdirecting electronic payments, or steal sensitive data, such as tax or pay information. Or they may convince the employee to open a malicious link or attachment, give up a password, or approve access. We provide clients with the experience, training, and technology resources needed to reduce their risk of financial or data loss from a BEC.

$43 Billion

Estimated global losses from BEC since 2016, according to the US Federal Bureau of Investigation (FBI)

How BEC occurs

How to protect against BEC

Discover our risk management offerings

We offer cyber policyholders a range of risk management offerings designed to improve your cyber resilience, reduce human error, and manage digital risk.

How to respond to a BEC incident

We encourage policyholders who experience an actual or suspected incident to notify us.