Upon completion of this module, you will be able to recognize scams used by cybercriminals that exploit consumers browsing the web, apply the S-A-F-E model to help protect against threats associated with browsing the web...
Description & Disclaimer
Using a fake domain that resembles a trusted supplier, a cybercriminal sends a bogus email or an invoice to a target organization. They aim to trick employees into disclosing confidential information and redirecting funds to bank accounts the fraudster controls. In this module, you will learn strategies that you can use to help protect against business and vendor email compromise (BEC/VEC).