{"id":14754,"date":"2024-08-02T13:38:26","date_gmt":"2024-08-02T13:38:26","guid":{"rendered":"https:\/\/trustpair.com\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/"},"modified":"2025-03-18T13:39:48","modified_gmt":"2025-03-18T13:39:48","slug":"business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond","status":"publish","type":"post","link":"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/","title":{"rendered":"Business email compromise (BEC): how to detect it, prevent it and respond"},"content":{"rendered":"<p>Spam emails are the most popular channel for cybersecurity attacks in the world. With the average person receiving between 100 to 120 emails daily, how many are legitimate?<\/p>\n<p>The impacts of email compromise can lead to financial chaos. Even worse for businesses, 46% of companies report suffering from reputational damage after a data breach. That\u2019s why <a href=\"https:\/\/trustpair.com\/gb\/blog\/fighting-fraud-the-next-frontier-in-protecting-payments\/\">it\u2019s key to plan detection, prevention<\/a>, and <strong>response in case of business email compromise.<\/strong><\/p>\n<p>Trustpair continuously audits supplier information and checks all payment campaigns before execution, blocking the effects of business email compromise. <a href=\"https:\/\/trustpair.com\/gb\/demo-5\/\">Contact one of our experts right away.<\/a><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-node hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5\"><img fetchpriority=\"high\" decoding=\"async\" id=\"hs-cta-img-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5.png\" alt=\"demo request trustpair b2b payment prevention plateform\" width=\"1250\" height=\"498\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, 'f87ea066-7298-4ae0-bcd1-f309efec12d5', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>What is business email compromise?<\/h2>\n<p>In 2022, over 4.3 million people used email across the globe. It\u2019s the most common way to stay in touch with your customers and reach out to vendors. But because email usage is so widespread, it\u2019s also a great hunting ground for fraudsters.<\/p>\n<p>Individuals who get caught out by email compromise report severe impacts, one of the most worrying being identity theft. <a href=\"https:\/\/www.ftc.gov\/reports\/consumer-sentinel-network-data-book-2021\">A staggering 20% of Americans fell victim to this crime in 2021<\/a>. The effects of such a personal crime could last years, leading to damaged creditworthiness, financial losses and a potentially false criminal record.<\/p>\n<p>Business email compromise (BEC) usually works by <strong>criminals impersonating a genuine source and using high-pressure tactics in order to access your finances or company secrets.<\/strong> It can place your entire organization at risk since it\u2019s the chosen channel for many different types of fraud.<\/p>\n<p>Here are some examples of the scams associated with business email compromise:<\/p>\n<ul>\n<li><a href=\"https:\/\/trustpair.com\/gb\/blog\/ceo-fraud-how-to-protect-your-organization-from-fraudsters\/\">CEO fraud<\/a>: a malicious type of spear phishing attack, typically a hacker perfectly impersonates a senior leader at your business and asks for funds or personal information<\/li>\n<li><a href=\"https:\/\/trustpair.com\/gb\/vendor-fraud-prevention\/\">Vendor fraud<\/a>: bad guys gain access to sensitive information regarding your suppliers and send you invoices &#8211; thanks to social engineering tactics, these often look believable<\/li>\n<li><a href=\"https:\/\/trustpair.com\/gb\/blog\/third-party-fraud-how-to-fight-back-in-your-business\/\">Third-party fraud<\/a>: also known as identity theft, fraudsters exploit vulnerabilities to steal passwords and use your account details to open lines of credit elsewhere<\/li>\n<\/ul>\n<p>In general, there is a high level of trust in business emails to remain secure &#8211; either through spam filters, IT departments, or common sense. But email hackers are a very real threat to businesses that should be taken seriously.<\/p>\n<h2>Why are BEC attacks of growing concern?<\/h2>\n<p>There are three major reasons for concern around BEC attacks:<\/p>\n<ul>\n<li>Rising long-term work-from-home culture<\/li>\n<li>Reputational damage<\/li>\n<li>Fluctuating economic environment<\/li>\n<\/ul>\n<h3>Work from home culture<\/h3>\n<p>Thanks to the pandemic, more Americans experienced what it was like to work from home. While we are past the peak, it\u2019s thought that close to 30% of employees still work from home in 2023.<\/p>\n<p><strong>Although work-from-home has huge employee benefits, it\u2019s proven much harder for companies to secure their systems against cybercrime.<\/strong> With workers spread all across the country, IT departments can\u2019t rely on an impenetrable internal hardware system on the office grounds.<\/p>\n<p>Instead, many turned towards relying on good spam filters and security practices. Unfortunately, the effectiveness of such measures largely depends on whether employees follow your protocols. What\u2019s more, third party resources (like social media channels, payment software, and marketing programs) might not be up to the same standard.<\/p>\n<p>Therefore, the trend of increasing work from home numbers has correlated with a rise in BEC cases. In fact, <strong>it\u2019s now the number one crime reported to the FBI<\/strong>, having grown significantly in the last five years.<\/p>\n<h3>Reputational Damage<\/h3>\n<p>That the reputational damage caused by getting hacked can lead to public outrage &#8211; and not towards the fraudsters. <strong>Corporations that become the victim to business email compromise stand to lose one of their most valuable assets: trust.<\/strong> Customers who can\u2019t trust you to keep their details safe and secure might find it\u2019s a good reason to turn to your competitors.<\/p>\n<p>If your business becomes a victim of business email compromise, it\u2019s not just your customers who might cancel their association with you. Investors and merchants might also choose to go their separate ways, leaving your business out of control with an entirely new host of financial problems.<\/p>\n<p>Learn more about the impact of <a href=\"https:\/\/trustpair.com\/gb\/blog\/the-6-strategies-for-effective-payment-fraud-management\/\">B2B payment fraud<\/a> in our latest report about fraud trends and insights. <a href=\"https:\/\/trustpair.com\/gb\/resources\/2025-uk-fraud-trends-and-insights\/\">Download it right now!<\/a><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-node hs-cta-26e69232-c009-4130-a9a9-c5b1c44d4013\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/26e69232-c009-4130-a9a9-c5b1c44d4013\"><img decoding=\"async\" id=\"hs-cta-img-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/26e69232-c009-4130-a9a9-c5b1c44d4013.png\" alt=\"fraud study us\" width=\"1250\" height=\"498\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, '26e69232-c009-4130-a9a9-c5b1c44d4013', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h3>Economic instability<\/h3>\n<p>Now more than ever, <strong>businesses can\u2019t afford to lose their hard-earned cash to fraudsters<\/strong>. Both political and economic instability were cited as the number one barrier to business growth in Q4 of 2022.<\/p>\n<p>One of the most impactful consequences of falling victim to fraudsters is, of course, the money that leaves your accounts. It\u2019s funding that won\u2019t be reinvested into the business, can\u2019t contribute towards the growth and won\u2019t lead to increasing your profits.<\/p>\n<p>Most of the time, companies fail to get their money back after fraud. Therefore, it\u2019s clear that <strong>BEC prevention is key.<\/strong><\/p>\n<h2><\/h2>\n<h2>Examples of BEC in the business world<\/h2>\n<p>Falling victim to BEC has led to some <strong>famously disastrous consequences.<\/strong><\/p>\n<p>For example, in 2020, <a href=\"https:\/\/www.bbc.com\/news\/technology-53607374\">Twitter fell victim to a data breach via BEC<\/a>. The attacker impersonated other workers to dupe an employee into sharing access to the internal systems. Once inside, the fraudsters hijacked the accounts of celebrities to post scam tweets.<\/p>\n<p>The reason that this style of hacking was so successful for the fraudsters is that they used a technique called phishing. This refers to a close, like-for-like impersonation of a known source. For example, the fraudsters may have studied the language used by their target and recreated it, or created <a href=\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/\">a spoof email address<\/a> that very closely resembled the real one.<\/p>\n<p>Another high-profile example of BEC includes Ubiquiti. The company was exploited in 2015 by an apparent vendor who sent false invoices and emails to the finance department. Unfortunately, an employee at one of the subsidiaries transferred some funds, and across a number of transactions the company lost over $46 million dollars.<\/p>\n<p><strong>While business email compromise can have a huge impact on corporations, there are some measures that you can put in place to protect your business.<\/strong><\/p>\n<h2>How can you detect business email compromise?<\/h2>\n<p><strong>You can increase security awareness within your business by teaching your people what to look for.<\/strong> Here are some manual ways to detect business email compromise:<\/p>\n<ol>\n<li><strong>Check the domain<\/strong>: spoof domains are very similar but not identical to the real credentials. An example of spoofing might be: scammer@frauds.org instead of scammer@frauds.com<\/li>\n<li><strong>Does the subject line sound weird?<\/strong> Urgency in the subject line may be considered a sign of a cyber attack. One version of this includes \u201cPayment Deadline\u201d, for example.<\/li>\n<li><strong>Are the links malicious?<\/strong> You can hover open a link to see if it links to what you\u2019re expecting or redirect you to another (potentially harmful malware) site<\/li>\n<\/ol>\n<p>However, <a href=\"https:\/\/trustpair.com\/gb\/blog\/finance-automation-processes-benefits-and-examples\/\">using automation<\/a> to detect BEC can have much more thorough results. For example, <a href=\"https:\/\/trustpair.com\/gb\/platform\/\">Trustpair\u2019s platform automatically audits campaign payments<\/a> before they are executed, blocking any transactions to suspicious or unknown bank accounts.<\/p>\n<h2>How can you prevent BEC in your business?<\/h2>\n<p>Unlike <a href=\"https:\/\/trustpair.com\/gb\/blog\/fraud-detection-models-and-machine-learning-all-you-need-to-know\/\">fraud detection<\/a>, phishing email prevention is about building a bulletproof shield around your business. This can be done successfully through the implementation of good procedures, protocols, and systems.<\/p>\n<h3>Upgrade security measures<\/h3>\n<p>Unfortunately, <strong>one of the biggest reasons that BEC scams and viruses succeed is due to weak cybersecurity measures.<\/strong><\/p>\n<p>Think about your email account right now &#8211; how many junk emails are sitting in your account? It\u2019s worth remembering that they\u2019re only the ones you can identify. 85% of all emails in the world are considered spam, and many make it through even though every email provider supposes to have a high-quality spam filter.<\/p>\n<p>The FBI considers <a href=\"https:\/\/www.graphus.ai\/blog\/how-can-you-defend-against-a-threat-that-is-64-times-worse-than-ransomware\/\">BEC 64 times more damaging than ransomware attacks<\/a>, so it is worth investing in the upgrades. Features such as two-factor authentication require your staff to log in using more than just their password; they must also have a time-out code or biometric match like facial identification. This prevents unauthorized access from fraudulent pretenders.<\/p>\n<p>Even better if you can <strong>upgrade your firewall or antivirus program as this should create an added layer of protection.<\/strong><\/p>\n<h3>Secure payment process<\/h3>\n<p>The secondary way to prevent phishing scams via BEC is something less obvious &#8211; focused on your payment process and P2P process itself. You see, even if fraudsters make it through your email system and get lucky with a transfer, <strong>the right payment software will not let that payment leave your accounts.<\/strong><\/p>\n<p>Trustpair specializes in preventing payment fraud. We secure your entire payment chain in order to <a href=\"https:\/\/trustpair.com\/gb\/blog\/third-party-fraud-how-to-fight-back-in-your-business\/\">manage third-party risks<\/a>. By working in real-time to validate your supplier details, we have prevented 100% of fraud attempts for our clients.<\/p>\n<p>What\u2019s more, your finance department can collaborate directly on the platform itself, leading to a more streamlined approach to work in general, and (more specifically) fraud prevention.<\/p>\n<h2>And if it\u2019s too late\u2026 how should your business respond after falling victim to a BEC attack?<\/h2>\n<p>If your business is unfortunate enough to discover spyware or that your emails have been compromised, the first thing you should do is <strong>alert your bank and the authorities.<\/strong> Immediately doing this could be the difference between seeing those funds again, or waving goodbye to them altogether.<\/p>\n<p>The other factor in getting the money back is often down to the payment method. Methods like wire fraud are typically fast and work in real-time, whereas check payments could take longer to clear.<\/p>\n<p>In response to BEC,<strong> it\u2019s a good idea to overhaul your systems and processes.<\/strong> For example, regular cybersecurity training for employees can help in the fight against fraud. This is a proven measure since regular cybersecurity training leads to fewer losses to fraudsters and faster resolutions of fraud cases.<\/p>\n<h2>Protecting Your Business from Business Email Compromise<\/h2>\n<p>Since most businesses rely on emails every single day, <strong>protecting the security of this channel should be a top priority<\/strong>. In doing so, your company can confidently work with new suppliers and merchants from around the world, all while reducing operational risk.<\/p>\n<p>Trustpair is by your side to help out. We help protect corporations from unwanted intrusions, whether that\u2019s through securing your payment platform or updating your supplier data in real-time. This way, your people always have the bigger picture and are equipped to make the right decisions.<\/p>\n<p><a href=\"https:\/\/trustpair.com\/gb\/resources\/2025-uk-fraud-trends-and-insights\/\">Prevent fraudsters from accessing your financial data, with Trustpair.<\/a><\/p>\n<p>Here\u2019s <strong>what you need to know about business email compromise (BEC):<\/strong><\/p>\n<ul>\n<li>Scammers try to gain access to your confidential information or financial accounts through a series of fake emails<\/li>\n<li>Cybercriminals usually impersonate a known supplier or senior member of staff inside the business to accomplish their scams<\/li>\n<li>Protect your business against an engineering attack like this through good quality anti-virus software and awareness training for your employees<\/li>\n<li>Prevent your finances from being breached through a secure payment chain and real-time account validation with Trustpair<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Spam emails are the most popular channel for cybersecurity attacks in the world. With the average person receiving between 100 to 120 emails daily, how many are legitimate? The impacts of email compromise can lead to financial chaos. Even worse for businesses, 46% of companies report suffering from reputational damage after a data breach. That\u2019s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14755,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[117],"tags":[],"class_list":["post-14754","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraud-protection-gb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Business Email Compromise (BEC): how to fight back - Trustpair<\/title>\n<meta name=\"description\" content=\"Business Email Compromise (BEC) is one of the most frequent frauds in business and for individuals. Learn how to fight back.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business Email Compromise (BEC): how to fight back - Trustpair\" \/>\n<meta property=\"og:description\" content=\"Business Email Compromise (BEC) is one of the most frequent frauds in business and for individuals. Learn how to fight back.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustpair\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T13:38:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-18T13:39:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1730218015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"trustpair_2438\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"trustpair_2438\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/\"},\"author\":{\"name\":\"trustpair_2438\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\"},\"headline\":\"Business email compromise (BEC): how to detect it, prevent it and respond\",\"datePublished\":\"2024-08-02T13:38:26+00:00\",\"dateModified\":\"2025-03-18T13:39:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/\"},\"wordCount\":1806,\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1730218015.jpg\",\"articleSection\":[\"Fraud protection\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/\",\"url\":\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/\",\"name\":\"Business Email Compromise (BEC): how to fight back - Trustpair\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1730218015.jpg\",\"datePublished\":\"2024-08-02T13:38:26+00:00\",\"dateModified\":\"2025-03-18T13:39:48+00:00\",\"description\":\"Business Email Compromise (BEC) is one of the most frequent frauds in business and for individuals. Learn how to fight back.\",\"breadcrumb\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/#primaryimage\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1730218015.jpg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1730218015.jpg\",\"width\":1200,\"height\":593},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trustpair.com\/gb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business email compromise (BEC): how to detect it, prevent it and respond\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustpair.com\/gb\/#website\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"name\":\"Trustpair\",\"description\":\"Leading Payment Fraud Prevention Platform\",\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustpair.com\/gb\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\",\"name\":\"Trustpair\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"width\":304,\"height\":73,\"caption\":\"Trustpair\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\",\"name\":\"trustpair_2438\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"caption\":\"trustpair_2438\"},\"sameAs\":[\"http:\/\/trustpair.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Business Email Compromise (BEC): how to fight back - Trustpair","description":"Business Email Compromise (BEC) is one of the most frequent frauds in business and for individuals. Learn how to fight back.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/","og_locale":"en_GB","og_type":"article","og_title":"Business Email Compromise (BEC): how to fight back - Trustpair","og_description":"Business Email Compromise (BEC) is one of the most frequent frauds in business and for individuals. Learn how to fight back.","og_url":"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/","og_site_name":"Trustpair","article_published_time":"2024-08-02T13:38:26+00:00","article_modified_time":"2025-03-18T13:39:48+00:00","og_image":[{"width":1200,"height":593,"url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1730218015.jpg","type":"image\/jpeg"}],"author":"trustpair_2438","twitter_card":"summary_large_image","twitter_misc":{"Written by":"trustpair_2438","Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/#article","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/"},"author":{"name":"trustpair_2438","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034"},"headline":"Business email compromise (BEC): how to detect it, prevent it and respond","datePublished":"2024-08-02T13:38:26+00:00","dateModified":"2025-03-18T13:39:48+00:00","mainEntityOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/"},"wordCount":1806,"publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1730218015.jpg","articleSection":["Fraud protection"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/","url":"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/","name":"Business Email Compromise (BEC): how to fight back - Trustpair","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/#primaryimage"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1730218015.jpg","datePublished":"2024-08-02T13:38:26+00:00","dateModified":"2025-03-18T13:39:48+00:00","description":"Business Email Compromise (BEC) is one of the most frequent frauds in business and for individuals. Learn how to fight back.","breadcrumb":{"@id":"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/#primaryimage","url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1730218015.jpg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1730218015.jpg","width":1200,"height":593},{"@type":"BreadcrumbList","@id":"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-bec-how-to-detect-it-prevent-it-and-respond\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trustpair.com\/gb\/"},{"@type":"ListItem","position":2,"name":"Business email compromise (BEC): how to detect it, prevent it and respond"}]},{"@type":"WebSite","@id":"https:\/\/trustpair.com\/gb\/#website","url":"https:\/\/trustpair.com\/gb\/","name":"Trustpair","description":"Leading Payment Fraud Prevention Platform","publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustpair.com\/gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/trustpair.com\/gb\/#organization","name":"Trustpair","url":"https:\/\/trustpair.com\/gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/","url":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","width":304,"height":73,"caption":"Trustpair"},"image":{"@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034","name":"trustpair_2438","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","caption":"trustpair_2438"},"sameAs":["http:\/\/trustpair.com"]}]}},"_links":{"self":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/comments?post=14754"}],"version-history":[{"count":2,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14754\/revisions"}],"predecessor-version":[{"id":17104,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14754\/revisions\/17104"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media\/14755"}],"wp:attachment":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media?parent=14754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/categories?post=14754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/tags?post=14754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}