The three major “whys” behind BEC: Get money, get data, or get access to money/data later.
Bruce Potter and Tyler Fornes chat about what BEC is, types of attacks, how compromise can start with phishing, and best practices to minimize BEC for your business.