Using a fake domain that resembles a trusted supplier, a cybercriminal sends a bogus email or an invoice to a target organization. They aim to trick employees into disclosing confidential information and redirecting funds to bank accounts the fraudster controls. In this module, you will learn strategies that you can use to help protect against business and vendor email compromise (BEC/VEC).
- Cybersecurity best practices
- Security awareness