{"id":6681,"date":"2017-04-28T11:26:22","date_gmt":"2017-04-28T10:26:22","guid":{"rendered":"http:\/\/blog.protrainings.eu\/?p=6681"},"modified":"2017-04-28T11:26:22","modified_gmt":"2017-04-28T10:26:22","slug":"6681-2","status":"publish","type":"post","link":"https:\/\/www.protrainings.uk\/blog\/6681-2\/","title":{"rendered":"Cyber-attacks and Business Email Compromise"},"content":{"rendered":"<p><a href=\"http:\/\/www.protrainings.uk\/blog\/?attachment_id=6682#main\" rel=\"attachment wp-att-6682\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-6682\" src=\"http:\/\/www.protrainings.uk\/blog\/wp-content\/uploads\/2017\/03\/shutterstock_249413905-150x150.jpg\" alt=\"Cyber-attacks \" width=\"150\" height=\"150\" \/><\/a>Cyber-attacks on SMEs have increased steadily in recent years. With criminals constantly devising new ways to steal information and money, one of the newest emerging threats is Business Email Compromise, also known as CEO or Chairman Fraud. The most frequent targets of this scam, small and medium-sized businesses, can lose huge sums because of one spurious email.<\/p>\n<p><strong>What is Business Email Compromise?<\/strong><!--more--><\/p>\n<p>A fraudster emails a company&#8217;s payments team, impersonating a contractor, supplier, creditor or even someone in senior management. The email might appear to be from the CEO, asking that an urgent payment be made, or from a supplier, requesting that future payments go to a new account. Often it instructs the recipient not to discuss the matter with anyone else.<\/p>\n<p>Since the sender&#8217;s email closely matches a known address, this type of fraud often goes unnoticed until too late. Cybercriminals may even hack into a real email account &#8211; from which fraudulent communications are hard to identify.<\/p>\n<p>Business email compromise in the real world<\/p>\n<p><strong>US based business: $400,000 loss.<\/strong><\/p>\n<p>The payments team received an email from the CEO, asking that payments be set up for new beneficiaries. A member of the team created and authorised the payments. By the time the team realised that the requester&#8217;s email address did not exactly match the CEO&#8217;s, it was two days later and the perpetrator had stolen nearly $400,000.<\/p>\n<p><strong>Global commodity trading platform provider: \u00a3920,000 loss.<\/strong><\/p>\n<p>An employee received an email from the CEO, requesting a new payment. This was authorised and made by two other staff members, the first employee even confirming with the CEO that the payment was legitimate. It was later discovered that the CEO&#8217;s email had been compromised, and that the CEO and employee had been talking about two different payments. The company lost \u00a3920,000.<\/p>\n<p>The risks to business<\/p>\n<ul>\n<li>Significant financial loss<\/li>\n<li>Reputational damage<\/li>\n<\/ul>\n<p><strong>How can I defend my business against email compromise?<\/strong><\/p>\n<ul>\n<li>Make sure your customers&#8217; staff are alert to this type of fraud.<\/li>\n<li>Implement a two-step payments verification process which includes a non-email check (eg. phone\/ SMS) with the initiator.<\/li>\n<li>Always use known contact details to follow up an email request &#8211; but don&#8217;t:\n<ul>\n<li>reply directly to the initial email; or<\/li>\n<li>use any phone numbers or other contact information included in the email.<\/li>\n<\/ul>\n<\/li>\n<li>Check email addresses.<\/li>\n<\/ul>\n<p>What seems legitimate at first glance may well be fraud<\/p>\n<p>Learn more about keeping your data safe with the ProTrainings Data Protection video online course at <a href=\"http:\/\/www.prodataprotection.co.uk\">www.prodataprotection.co.uk<\/a> or by calling ProTrainings on 01206 805359.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber-attacks on SMEs have increased steadily in recent years. With criminals constantly devising new ways to steal information and money, one of the newest emerging threats is Business Email Compromise, also known as CEO or Chairman Fraud. The most frequent targets of this scam, small and medium-sized businesses, can lose huge sums because of one [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[720],"class_list":["post-6681","post","type-post","status-publish","format-standard","hentry","category-all-courses","tag-cyber-attacks"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber-attacks and Business Email Compromise<\/title>\n<meta name=\"description\" content=\"Cyber-attacks on SMEs have increased steadily in recent years. With criminals constantly devising new ways to steal information and money, one of the newest\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.protrainings.uk\/blog\/6681-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber-attacks and Business Email Compromise\" \/>\n<meta property=\"og:description\" content=\"Cyber-attacks on SMEs have increased steadily in recent years. With criminals constantly devising new ways to steal information and money, one of the newest\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.protrainings.uk\/blog\/6681-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Online Health &amp; Safety Training Courses | ProTrainings Europe\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/protrainingsuk\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-28T10:26:22+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.protrainings.uk\/blog\/wp-content\/uploads\/2017\/03\/shutterstock_249413905-150x150.jpg\" \/>\n<meta name=\"author\" content=\"Keith Sleightholm\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@protrainingsuk\" \/>\n<meta name=\"twitter:site\" content=\"@protrainingsuk\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Keith Sleightholm\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/6681-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/6681-2\\\/\"},\"author\":{\"name\":\"Keith Sleightholm\",\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/#\\\/schema\\\/person\\\/1d4ce8b0d78ec0a52ce02f89849bed58\"},\"headline\":\"Cyber-attacks and Business Email Compromise\",\"datePublished\":\"2017-04-28T10:26:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/6681-2\\\/\"},\"wordCount\":423,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/6681-2\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.protrainings.uk\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/shutterstock_249413905-150x150.jpg\",\"keywords\":[\"Cyber-attacks\"],\"articleSection\":[\"Courses\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/6681-2\\\/\",\"url\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/6681-2\\\/\",\"name\":\"Cyber-attacks and Business Email Compromise\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/6681-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/6681-2\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.protrainings.uk\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/shutterstock_249413905-150x150.jpg\",\"datePublished\":\"2017-04-28T10:26:22+00:00\",\"description\":\"Cyber-attacks on SMEs have increased steadily in recent years. With criminals constantly devising new ways to steal information and money, one of the newest\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/6681-2\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/6681-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/6681-2\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.protrainings.uk\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/shutterstock_249413905-150x150.jpg\",\"contentUrl\":\"http:\\\/\\\/www.protrainings.uk\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/shutterstock_249413905-150x150.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/6681-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber-attacks and Business Email Compromise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/\",\"name\":\"Online Health & Safety Training Courses | ProTrainings Europe\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/#organization\",\"name\":\"Online Health & Safety Training Courses | ProTrainings Europe\",\"url\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/logo.svg\",\"width\":175,\"height\":57,\"caption\":\"Online Health & Safety Training Courses | ProTrainings Europe\"},\"image\":{\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/protrainingsuk\",\"https:\\\/\\\/x.com\\\/protrainingsuk\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/#\\\/schema\\\/person\\\/1d4ce8b0d78ec0a52ce02f89849bed58\",\"name\":\"Keith Sleightholm\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3e9cd9e0b631a9c070c09d80ebf33c198ab8d7a236174589cf897864c850f658?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3e9cd9e0b631a9c070c09d80ebf33c198ab8d7a236174589cf897864c850f658?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3e9cd9e0b631a9c070c09d80ebf33c198ab8d7a236174589cf897864c850f658?s=96&d=mm&r=g\",\"caption\":\"Keith Sleightholm\"},\"sameAs\":[\"https:\\\/\\\/www.protrainings.uk\"],\"url\":\"https:\\\/\\\/www.protrainings.uk\\\/blog\\\/author\\\/keith-sleightholm\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber-attacks and Business Email Compromise","description":"Cyber-attacks on SMEs have increased steadily in recent years. With criminals constantly devising new ways to steal information and money, one of the newest","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.protrainings.uk\/blog\/6681-2\/","og_locale":"en_GB","og_type":"article","og_title":"Cyber-attacks and Business Email Compromise","og_description":"Cyber-attacks on SMEs have increased steadily in recent years. With criminals constantly devising new ways to steal information and money, one of the newest","og_url":"https:\/\/www.protrainings.uk\/blog\/6681-2\/","og_site_name":"Online Health &amp; Safety Training Courses | ProTrainings Europe","article_publisher":"https:\/\/www.facebook.com\/protrainingsuk","article_published_time":"2017-04-28T10:26:22+00:00","og_image":[{"url":"http:\/\/www.protrainings.uk\/blog\/wp-content\/uploads\/2017\/03\/shutterstock_249413905-150x150.jpg","type":"","width":"","height":""}],"author":"Keith Sleightholm","twitter_card":"summary_large_image","twitter_creator":"@protrainingsuk","twitter_site":"@protrainingsuk","twitter_misc":{"Written by":"Keith Sleightholm","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.protrainings.uk\/blog\/6681-2\/#article","isPartOf":{"@id":"https:\/\/www.protrainings.uk\/blog\/6681-2\/"},"author":{"name":"Keith Sleightholm","@id":"https:\/\/www.protrainings.uk\/blog\/#\/schema\/person\/1d4ce8b0d78ec0a52ce02f89849bed58"},"headline":"Cyber-attacks and Business Email Compromise","datePublished":"2017-04-28T10:26:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.protrainings.uk\/blog\/6681-2\/"},"wordCount":423,"commentCount":0,"publisher":{"@id":"https:\/\/www.protrainings.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.protrainings.uk\/blog\/6681-2\/#primaryimage"},"thumbnailUrl":"http:\/\/www.protrainings.uk\/blog\/wp-content\/uploads\/2017\/03\/shutterstock_249413905-150x150.jpg","keywords":["Cyber-attacks"],"articleSection":["Courses"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.protrainings.uk\/blog\/6681-2\/","url":"https:\/\/www.protrainings.uk\/blog\/6681-2\/","name":"Cyber-attacks and Business Email Compromise","isPartOf":{"@id":"https:\/\/www.protrainings.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.protrainings.uk\/blog\/6681-2\/#primaryimage"},"image":{"@id":"https:\/\/www.protrainings.uk\/blog\/6681-2\/#primaryimage"},"thumbnailUrl":"http:\/\/www.protrainings.uk\/blog\/wp-content\/uploads\/2017\/03\/shutterstock_249413905-150x150.jpg","datePublished":"2017-04-28T10:26:22+00:00","description":"Cyber-attacks on SMEs have increased steadily in recent years. With criminals constantly devising new ways to steal information and money, one of the newest","breadcrumb":{"@id":"https:\/\/www.protrainings.uk\/blog\/6681-2\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.protrainings.uk\/blog\/6681-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.protrainings.uk\/blog\/6681-2\/#primaryimage","url":"http:\/\/www.protrainings.uk\/blog\/wp-content\/uploads\/2017\/03\/shutterstock_249413905-150x150.jpg","contentUrl":"http:\/\/www.protrainings.uk\/blog\/wp-content\/uploads\/2017\/03\/shutterstock_249413905-150x150.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.protrainings.uk\/blog\/6681-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.protrainings.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber-attacks and Business Email Compromise"}]},{"@type":"WebSite","@id":"https:\/\/www.protrainings.uk\/blog\/#website","url":"https:\/\/www.protrainings.uk\/blog\/","name":"Online Health & Safety Training Courses | ProTrainings Europe","description":"","publisher":{"@id":"https:\/\/www.protrainings.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.protrainings.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.protrainings.uk\/blog\/#organization","name":"Online Health & Safety Training Courses | ProTrainings Europe","url":"https:\/\/www.protrainings.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.protrainings.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.protrainings.uk\/blog\/wp-content\/uploads\/2025\/05\/logo.svg","contentUrl":"https:\/\/www.protrainings.uk\/blog\/wp-content\/uploads\/2025\/05\/logo.svg","width":175,"height":57,"caption":"Online Health & Safety Training Courses | ProTrainings Europe"},"image":{"@id":"https:\/\/www.protrainings.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/protrainingsuk","https:\/\/x.com\/protrainingsuk"]},{"@type":"Person","@id":"https:\/\/www.protrainings.uk\/blog\/#\/schema\/person\/1d4ce8b0d78ec0a52ce02f89849bed58","name":"Keith Sleightholm","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/3e9cd9e0b631a9c070c09d80ebf33c198ab8d7a236174589cf897864c850f658?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3e9cd9e0b631a9c070c09d80ebf33c198ab8d7a236174589cf897864c850f658?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3e9cd9e0b631a9c070c09d80ebf33c198ab8d7a236174589cf897864c850f658?s=96&d=mm&r=g","caption":"Keith Sleightholm"},"sameAs":["https:\/\/www.protrainings.uk"],"url":"https:\/\/www.protrainings.uk\/blog\/author\/keith-sleightholm\/"}]}},"_links":{"self":[{"href":"https:\/\/www.protrainings.uk\/blog\/wp-json\/wp\/v2\/posts\/6681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protrainings.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protrainings.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protrainings.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protrainings.uk\/blog\/wp-json\/wp\/v2\/comments?post=6681"}],"version-history":[{"count":0,"href":"https:\/\/www.protrainings.uk\/blog\/wp-json\/wp\/v2\/posts\/6681\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.protrainings.uk\/blog\/wp-json\/wp\/v2\/media?parent=6681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protrainings.uk\/blog\/wp-json\/wp\/v2\/categories?post=6681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protrainings.uk\/blog\/wp-json\/wp\/v2\/tags?post=6681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}