Breaking Down BEC

Published by Proofpoint

The Modern CISO’s Framework for Identifying, Classifying and Stopping Email Fraud

Business email compromise (BEC), also known as email fraud, is one of cybersecurity’s costliest and least understood threats. As BEC schemes have evolved, industry nomenclature has outlived its usefulness. Without a framework to describe BEC attacks—let alone conceptualise them—researching and managing the threat is difficult, if not impossible. The Proofpoint Email Fraud Taxonomy is designed to help security professionals better identify, classify and block this ever-costly threat. Download this guide to learn:

  • How to classify BEC attacks using identity, deception and theme
  • Similarities and key differences between invoicing fraud and payroll redirects
  • The essential human traits threat actors exploit in lures- and task-based attacks
  • Why advance-fee fraud still works

Download Now


Required fields*

Please agree to the conditions

By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email

Related Categories Compliance, Malware, Email & Communication Technologies , Email Threats, SAN, Cloud, Machine Learning, AIM, Business Process, SAP, Security Awareness Training

More resources from Proofpoint