Skip to content

Business Email Compromise

Business Email Compromise (BEC) typically starts with attacks such as account compromise and impersonation. Attackers use these methods to trick individuals into revealing sensitive information or transferring funds.

Go to My Products > Email Protection > Business Email Compromise to manage BEC configuration.

You can manage protection against these threats in the following ways:

  • Account compromise: Specify admins who will receive a notification email when a user account is suspected to be compromised.
  • Impersonation: Manage your VIP list to detect and block impersonation attempts targeting well-known brands, VIPs in your organization, or your vendor, customer, or partner organizations.

For more information about these protection features, see the following pages: