{"id":14932,"date":"2024-08-02T13:38:26","date_gmt":"2024-08-02T13:38:26","guid":{"rendered":"https:\/\/trustpair.com\/blog\/spoofing-an-open-door-to-corporate-fraud\/"},"modified":"2025-07-15T14:00:39","modified_gmt":"2025-07-15T14:00:39","slug":"spoofing-an-open-door-to-corporate-fraud","status":"publish","type":"post","link":"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/","title":{"rendered":"Spoofing: an open door to corporate fraud"},"content":{"rendered":"<p>Widely used in the past few years, <strong>spoofing is the act of usurping someone\u2019s identity<\/strong> (by using a false email address for instance) with malicious intent. This type of scam is increasingly used by cybercrime experts to target corporations. So are <a href=\"https:\/\/trustpair.com\/gb\/blog\/the-7-ways-to-recognize-phishing-and-avoid-it\/\">phishing<\/a> or ransomware, as attempts to <strong>gain unauthorized access to sensitive information<\/strong> &#8211; or for direct financial gain. Regardless of the hackers\u2019 motive, <strong>spoofing has disastrous consequences for any organization<\/strong>. From financial loss to reputational damage, it is one of the online threats that need to be taken seriously. In fact, 83% of organizations reported being victims of phishing attacks in 2021, with an expected 6 billion expected in 2022.<\/p>\n<p>In this article, we cover <strong>what exactly spoofing is<\/strong> and what are the <strong>best practices to implement<\/strong> to prevent yourself from falling victim to it.<\/p>\n<p>Trustpair is a SaaS solution that helps you <strong>protect yourself from the financial effects of frauds like spoofing<\/strong>. Our solution automatically and systematically checks your third-party information against our worldwide financial databases. Furthermore, it raises the alert in case of fraudulent payment attempts. <a href=\"https:\/\/trustpair.com\/gb\/demo-5\/\">Contact one of our experts today!<\/a><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-node hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5\"><img fetchpriority=\"high\" decoding=\"async\" id=\"hs-cta-img-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5.png\" alt=\"demo request trustpair b2b payment prevention plateform\" width=\"1250\" height=\"498\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, 'f87ea066-7298-4ae0-bcd1-f309efec12d5', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>How does email spoofing work?<\/h2>\n<p>Spoofing &#8211; or pretending to be someone else, mainly carried out via email messages &#8211; is increasingly used by hackers.<\/p>\n<p><strong>It\u2019s a scamming technique that aims to mislead the recipient of an email. <\/strong>Indeed, the fraudster uses\u00a0an email address that looks very similar to the one of a known sender (like john@banana1.com instead of john@banana.com).<\/p>\n<p>Contrary to other well-known hacking techniques like phishing or ransomware, spoofing targets a specific person as part of a<strong> social-engineering attack<\/strong>. Indeed, scammers have to know the email address they impersonate and also their roles within the company, as they\u2019ll have more leverage impersonating a C-suite executive than a low-level employee.<\/p>\n<p>Those cyberattacks are more and more common in companies. 83% of organizations reported being victims of phishing attacks in 2021, with an expected 6 billion expected in 2022. In fact, a majority of employees have been targeted more than once by a phishing scam.<\/p>\n<h3>This a typical spoofing example.<\/h3>\n<p>In a classic spoofing scenario, the victim receives an email from aude.monet@trsutpair.fr instead of aude.monet@trustpair.fr. The victim doesn\u2019t know yet, but <strong>they\u2019re the target of email spoofing.<\/strong><\/p>\n<p>Quickly skimming through the email, they might not realize that this is a fraudulent email (in this case, there is only a letter inversion in the address). Simply opening up the email can install malware or spyware on their device. Unfortunately, these devices can steal personal data (like their passwords) and send them to the attackers.<\/p>\n<p>Hackers can also <strong>compromise domain names<\/strong>. For instance, they\u2019ll create a fake email address ending with \u201ctrustpair.ca\u201d (instead of trustpair.com), leading the recipients to believe they are indeed communicating with Trustpair employees.<\/p>\n<p>When done correctly, this hacking is difficult to detect as the email address or domain really looks legitimate. The average employee has to deal with a big amount of emails every day and doesn\u2019t have the time to double-check the identity of each email\u2019s sender.<\/p>\n<p><strong>Spoofing can still happen when harsher security protocols are in place.<\/strong> Indeed, IP spoofing for instance is when a scammer uses the unique IP address of another device. Masquerading as a trusted source gets them access to otherwise unauthorized information.<\/p>\n<p>While most companies have email solutions, antivirus, and even firewalls that are meant to protect their employees from spam, those aren\u2019t failproof, especially if not updated regularly.<br \/>\nCybercriminals make the most of this kind of security breach to attack a company in order to <strong>steal sensitive information<\/strong>, leaving the company compromised.<\/p>\n<h2><\/h2>\n<h2>Spoofing is a doorway to corporate fraud.<\/h2>\n<p>As we\u2019ve seen, <strong>spoofing is a hacking technique<\/strong> that is used to impersonate an email address, an IP address, a domain name, or even a caller ID.<\/p>\n<p>In addition, a spoofer can\u00a0 <a href=\"https:\/\/trustpair.com\/gb\/blog\/third-party-fraud-how-to-fight-back-in-your-business\/\">usurp the identity of one of your suppliers<\/a>, sending emails to your collaborators asking for a bank transfer to their account.<\/p>\n<p>They can ask for payment for a real unpaid invoice, using a real supplier you have. They then change the financial information so the money is transferred to their own illegitimate bank account. That\u2019s what we call fake supplier fraud, among the <a href=\"https:\/\/trustpair.com\/gb\/blog\/the-6-types-of-bank-account-fraud-to-watch-out-for\/\">many B2B payment frauds<\/a>.<\/p>\n<p>With the rise of bots and AI, it is also easier for fraudsters to <strong>use social engineering to create fake supplier profiles. <\/strong>\u00a0This makes the need for efficient countermeasures even greater for corporations.<\/p>\n<p>Another spoofing-related fraud is CEO fraud <a href=\"https:\/\/trustpair.com\/gb\/blog\/ceo-fraud-how-to-protect-your-organization-from-fraudsters\/\">(learn more here)<\/a>.<\/p>\n<p>In this case, one of your employees receives an email from someone pretending to be your CEO asking for <strong>an \u201curgent\u201d transfer to a third party<\/strong>. It can be under the false pretense of a payment delay, a debt to pay, etc. Generally, the person impersonates the CEO or any other high-level executive. This leads to the employee carrying out the request without too many questions. CEO fraud &#8211; a type of Business Email Compromise (BEC) &#8211; <strong>is one of the most widespread scams around. <\/strong><\/p>\n<p>According to the FBI\u2019s Internet Crime Report for 2021, BEC scams were responsible for more than a third of all cybercrime losses this year, with a 33% increase from 2021.<br \/>\nAll companies are targeted, regardless of their size or industry. Between 2013 and 2019, CEO fraud cost the US economy <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/05\/18\/beware-the-tactics-used-for-ceo-fraud-by-bec-scammers\/?sh=4c5f48a178c7\">26 billion dollars<\/a>.<\/p>\n<p>For hackers, there is a double incentive to carry it out:<\/p>\n<ul>\n<li><strong>It\u2019s quite easy to set up<\/strong> (you only need to set up a fake email address).<\/li>\n<li><strong>It looks legitimate<\/strong>, which means it works very well.<\/li>\n<\/ul>\n<p>Even though it seems spoofing attacks might be obvious from a theoretical standpoint (and therefore easily foiled) the reality is different. In a recent report, <a href=\"https:\/\/www.proofpoint.com\/us\/newsroom\/press-releases\/proofpoints-2022-state-phish-report-reveals-email-based-attacks-dominated\">42% of employees admitted to taking a dangerous action<\/a> (like clicking a link in a suspicious email, downloading malware, or revealing personal information) in 2021.<\/p>\n<p>Emails exchanges with suppliers and third parties are a daily occurrence, so employees don\u2019t really have any reason to be suspicious about any email they receive. That\u2019s why spoofing is so efficient, and dangerous.<\/p>\n<p>Do you want to learn more about B2B payment fraud? <a href=\"https:\/\/trustpair.com\/gb\/resources\/2025-uk-fraud-trends-and-insights\/\">Check out our fraud study<\/a> and discover trends, insights and advice to fight efficiently against fraud!<\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-04dbbb6a-9de1-4a58-ba57-b9d88e480c76\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-04dbbb6a-9de1-4a58-ba57-b9d88e480c76\" class=\"hs-cta-node hs-cta-04dbbb6a-9de1-4a58-ba57-b9d88e480c76\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/04dbbb6a-9de1-4a58-ba57-b9d88e480c76\"><img decoding=\"async\" id=\"hs-cta-img-04dbbb6a-9de1-4a58-ba57-b9d88e480c76\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/04dbbb6a-9de1-4a58-ba57-b9d88e480c76.png\" alt=\"2022 fraud study - SAP Trustpair\" width=\"1250\" height=\"498\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, '04dbbb6a-9de1-4a58-ba57-b9d88e480c76', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2><\/h2>\n<h2>What are the best practices to protect yourself from spoofing?<\/h2>\n<h3>Monitor and promote awareness amongst your employees to block spoofing.<\/h3>\n<p>The first step to take is to carefully monitor your IT security as well as<strong> raise awareness around spoofing and fraudulent emails<\/strong> &#8211; as well as other Internet threats. They\u2019re essential and efficient steps to start <a href=\"https:\/\/trustpair.com\/gb\/blog\/cybercriminals-and-how-to-protect-your-company-against-them\/\">protecting yourself from attacks<\/a> against your company by cyber-criminals.<\/p>\n<p>Moreover, they can be easily implemented, thanks to a lot of resources available online. Learning to spot those potentially malicious emails must become a reflex for everyone. It can protect against numerous disasters.<\/p>\n<p>In your company, if that\u2019s not already done, you can <strong>set up a spam filter on all emails<\/strong>. Even though it won\u2019t be enough to fully protect your company fully from being spoofed, it\u2019s a great first barrier against it.<\/p>\n<h3>Don\u2019t underestimate internal communication between teams.<\/h3>\n<p>The more your teams communicate amongst themselves, the better they\u2019ll be able to react and <strong>protect your company against spoofing attacks<\/strong> or phishing attempts.<\/p>\n<h3>Secure email addresses as well as IP addresses to prevent spoofing<\/h3>\n<p>By hiding your email and IP addresses from any external organization, you\u2019ll be able to <strong>limit the risk of spoofing<\/strong>. You can install a proxy server, which will do that as well as limit access to suspicious-looking websites and track online activity across your organization.<\/p>\n<h3>Install a double check in case of financial transactions.<\/h3>\n<p>This best practice can be integrated in your anti-spoofing strategy. For instance, you can set up a systematic check between the emails received and the identity of the sender. This will make sure both information matches. Ideally, this check will be automated.<\/p>\n<h3>Set up an ongoing check for third parties\u2019 financial data.<\/h3>\n<p>Each request to change a third party\u2019s bank account details should <strong>be controlled in order to make sure it\u2019s not an attempt at spoofing<\/strong>. That might seem like a lot of extra work for your accounting team. However, it doesn\u2019t have to be this way.<\/p>\n<p>This is <strong>something that we offer at Trustpair.<\/strong> Our solution makes automated checks between the financial information and the name of your suppliers (and other third parties). As such, it ensures you are indeed paying the right person and bank account.<\/p>\n<p>Our solution <strong>helps increase your control processes. <\/strong>It also raises the security awareness across your company, which leads to fewer fraud risks without burdening your teams. <a href=\"https:\/\/trustpair.com\/gb\/demo-5\/\">Contact one of our experts today!<\/a><\/p>\n<p><strong>Key Takeaways:<\/strong><\/p>\n<p>Spoofing is a hacking technique that <strong>usurps someone\u2019s identity by creating fake email addresses<\/strong>, domain names, or IP addresses. Malicious hackers target a specific person within the company. This isn&#8217;t like other scams like phishing or ransomware which target a wider audience.<\/p>\n<p>This type of email scam is an <strong>open door to fraud in your company<\/strong>. Victims can then fall prey to fake supplier fraud, or CEO fraud.<\/p>\n<p>To protect yourself from spoofing, the first thing to do is <strong>raise awareness of those hacking techniques within your organization.<\/strong> You can also set up security protocols like securing your IP addresses or setting up a firewall.<\/p>\n<p>Another way to protect against financial fraud is to <strong>set up automatic double-checks when emails are about financial transactions.<\/strong> You can also ensure the financial data shared in the email received matches those of your third party.<\/p>\n<p>The automated control of your suppliers\u2019 financial information can be done effortlessly through dedicated software like Trustpair. We work with financial departments of large corporations to help them digitize their processes in a safe and effective way. We secure their payments and ensuring money is always transferred to the right bank accounts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Widely used in the past few years, spoofing is the act of usurping someone\u2019s identity (by using a false email address for instance) with malicious intent. This type of scam is increasingly used by cybercrime experts to target corporations. So are phishing or ransomware, as attempts to gain unauthorized access to sensitive information &#8211; or [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14933,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[117],"tags":[],"class_list":["post-14932","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraud-protection-gb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Spoofing: how to protect your business against it - Trustpair<\/title>\n<meta name=\"description\" content=\"Spoofing is used by scammers to target specific employees and obtain illegal payments. Learn how to protect your company against this scam.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spoofing: how to protect your business against it - Trustpair\" \/>\n<meta property=\"og:description\" content=\"Spoofing is used by scammers to target specific employees and obtain illegal payments. Learn how to protect your company against this scam.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustpair\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T13:38:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-15T14:00:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1609909558.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"trustpair_2438\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"trustpair_2438\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/\"},\"author\":{\"name\":\"trustpair_2438\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\"},\"headline\":\"Spoofing: an open door to corporate fraud\",\"datePublished\":\"2024-08-02T13:38:26+00:00\",\"dateModified\":\"2025-07-15T14:00:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/\"},\"wordCount\":1660,\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1609909558.jpg\",\"articleSection\":[\"Fraud protection\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/\",\"url\":\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/\",\"name\":\"Spoofing: how to protect your business against it - Trustpair\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1609909558.jpg\",\"datePublished\":\"2024-08-02T13:38:26+00:00\",\"dateModified\":\"2025-07-15T14:00:39+00:00\",\"description\":\"Spoofing is used by scammers to target specific employees and obtain illegal payments. Learn how to protect your company against this scam.\",\"breadcrumb\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/#primaryimage\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1609909558.jpg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1609909558.jpg\",\"width\":1200,\"height\":593},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trustpair.com\/gb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spoofing: an open door to corporate fraud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustpair.com\/gb\/#website\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"name\":\"Trustpair\",\"description\":\"Leading Payment Fraud Prevention Platform\",\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustpair.com\/gb\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\",\"name\":\"Trustpair\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"width\":304,\"height\":73,\"caption\":\"Trustpair\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\",\"name\":\"trustpair_2438\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"caption\":\"trustpair_2438\"},\"sameAs\":[\"http:\/\/trustpair.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Spoofing: how to protect your business against it - Trustpair","description":"Spoofing is used by scammers to target specific employees and obtain illegal payments. Learn how to protect your company against this scam.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/","og_locale":"en_GB","og_type":"article","og_title":"Spoofing: how to protect your business against it - Trustpair","og_description":"Spoofing is used by scammers to target specific employees and obtain illegal payments. Learn how to protect your company against this scam.","og_url":"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/","og_site_name":"Trustpair","article_published_time":"2024-08-02T13:38:26+00:00","article_modified_time":"2025-07-15T14:00:39+00:00","og_image":[{"width":1200,"height":593,"url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1609909558.jpg","type":"image\/jpeg"}],"author":"trustpair_2438","twitter_card":"summary_large_image","twitter_misc":{"Written by":"trustpair_2438","Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/#article","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/"},"author":{"name":"trustpair_2438","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034"},"headline":"Spoofing: an open door to corporate fraud","datePublished":"2024-08-02T13:38:26+00:00","dateModified":"2025-07-15T14:00:39+00:00","mainEntityOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/"},"wordCount":1660,"publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1609909558.jpg","articleSection":["Fraud protection"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/","url":"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/","name":"Spoofing: how to protect your business against it - Trustpair","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/#primaryimage"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1609909558.jpg","datePublished":"2024-08-02T13:38:26+00:00","dateModified":"2025-07-15T14:00:39+00:00","description":"Spoofing is used by scammers to target specific employees and obtain illegal payments. Learn how to protect your company against this scam.","breadcrumb":{"@id":"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/#primaryimage","url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1609909558.jpg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1609909558.jpg","width":1200,"height":593},{"@type":"BreadcrumbList","@id":"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trustpair.com\/gb\/"},{"@type":"ListItem","position":2,"name":"Spoofing: an open door to corporate fraud"}]},{"@type":"WebSite","@id":"https:\/\/trustpair.com\/gb\/#website","url":"https:\/\/trustpair.com\/gb\/","name":"Trustpair","description":"Leading Payment Fraud Prevention Platform","publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustpair.com\/gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/trustpair.com\/gb\/#organization","name":"Trustpair","url":"https:\/\/trustpair.com\/gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/","url":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","width":304,"height":73,"caption":"Trustpair"},"image":{"@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034","name":"trustpair_2438","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","caption":"trustpair_2438"},"sameAs":["http:\/\/trustpair.com"]}]}},"_links":{"self":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/comments?post=14932"}],"version-history":[{"count":2,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14932\/revisions"}],"predecessor-version":[{"id":20189,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14932\/revisions\/20189"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media\/14933"}],"wp:attachment":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media?parent=14932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/categories?post=14932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/tags?post=14932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}