

Implementing a multi-layered approach is usually the best strategy: If you are relying solely on the old staple of protection software, your security against BEC is going to be found wanting. How do I stay protected from a business email compromise scam? Small businesses are usually the easiest targets because they usually have just one person doing many transactions and more than likely not following proper security protocols. Stories of people losing their housing deposit and lawyers’ fees are common, with attackers mimicking law firms and issuing invoices. You can easily fall victim to BEC if you are following poor online security etiquette and doing fairly basic transactions online. Hackers could be monitoring email at your company just now, assessing everyone’s position and role in the company and building up a profile of interactions upon which to mimic.Īnd if you think these hackers are just targeting big business, you are wrong. This is not an email blast with malware but usually an analytical process by scammers undertaken over weeks and months. These attacks are exceptionally well thought out and structured. The recipe of trust, authority and familiarity alone is resulting in billion-dollar losses. To put it simply, BEC is everywhere, and it's growing.īusiness Email Compromise is so effective because it doesn’t utilize payloads, meaning conventional email security solutions will usually be unable to detect it. Recent numbers indicate a 2,370 percent increase between 2015-2016, with 96 percent of companies having encountered BEC attempts at an organizational average of 46 attempted attacks per company. The scam was reported over 40,000 times in 131 countries and in all 50 states. The FBI estimates that $5 billion dollars were lost over a three-year period 2013-2016 ($3.1 Billion since 2015). Luckily for the big boys, they have the power to get back every dime – you probably won’t be so lucky, by contrast. Facebook and Google lost an eye-watering $100 million dollars each. However, the numbers are real, and the marks are extremely lofty. I imagine all of this seems very low-brow and benign after all the sophistication and technical nuance of many of cyber-attacks we saw throughout 2017. The attack usually comes in the form of a bogus invoice, a compromised account from an actual employee, or a spoofed email address, which can look exceptionally like the real parties. The basic premise is that the attacker is pretending to be someone he or she is not (usually an executive at a company) and is pressuring lower-level employees to hand over sensitive information or money under “time sensitivity” duress. There are typically three varieties of this scam, as outlined previously in this well-crafted Tripwire article. The scam itself is the oldest trick in the book – a simple act of deception – and it is usually only uncovered once the attacker is off with your hard-earned money. The scammers are leveraging social engineering tactics as opposed to technical exploits.

Unlike viruses, Trojans and worms, there isn’t an abundance of software, firewalls, or preventative measures that can protect you. Often in the shadow of the more extravagant, media-friendly super-hacks or ransomware compromises, BEC is leading the line on both the number of attack victims and the direct losses encountered by businesses.Īlthough not as en vogue as other ‘nouveau’ cybersecurity threats, if you are simply looking at direct business costs, BEC leaves almost every other cyberattack in the dust. Step 4: You are ready to go, save and send.BEC, or Business Email Compromise, is a contemporary twist on a staple scam. Step 2: Select your client to bill, easily from your contacts Get notified when the client receives and opens your invoice.Ĭreating and sending an invoice has never been so easy: Track your incomes with easy to use reports. Sync all your devices with the same account. Quickly setup clients from your phone contact list. Choose from different invoice templates and customize them.

Generate invoices from estimates with a tap. Create invoices in less than a minute, anywhere you are. Also, you will be notified when the customer receives and opens your invoice.

You will be able to configure as many details as you need, adding payment information, taxes, withholding, due dates, extra images, discount, signature and more. Keep your finances organized with Invoice PRO, where you can easily create, send and track invoices on your phone.
#INSTAY FORM ESTIMATES AND INVOICE PRO PRO#
Whether you need to create and invoice or estimate, Invoice PRO is the #1 invoice app for the job. It’s perfect for small businesses, freelancers and contractors.
#INSTAY FORM ESTIMATES AND INVOICE PRO PROFESSIONAL#
Invoice PRO is the easiest way to create and send professional invoices to your clients.
