Using a fake domain that resembles a trusted supplier, a cybercriminal sends a bogus email or an invoice to a target organization. They aim to trick employees into disclosing confidential information and redirecting funds to bank accounts the fraudster controls. In this module, you will learn strategies that you can use to help protect against business and vendor email compromise (BEC/VEC).
Topics:
- Cybersecurity best practices
- Security awareness
Short Description Upon completion of this module, you will be able to recognize scams used by cybercriminals that exploit consumers browsing the web, apply the S-A-F-E model to help protect against threats associated with browsing the web...
By Industry Business Services
By Audience Legal and Compliance
By Audience Human Resources
By Audience Information Technology
By Audience Safety
By Industry Construction
By Industry Financial Services
By Industry Healthcare
By Industry Hotels
By Industry Manufacturing
By Industry Restaurants
By Industry Retail
By Industry Technology
By Topic Security First Preferred Solution
By Topic Security First Elite Solution