Page 8 - AO3QT2020CL
P. 8
How do you prevent BEC attacks?
Training training training training training – employees need to to to be trained to to to to to identify phishing emails and and have the protocols in in in in in in in in in place as to to to how to to to handle tif if an an an email email is is received Software tools – intrusion detection system rules
to to help identify emails appearing to to come from an employee Establish email rules
to to ensure
the the ‘reply to’ and the the ‘from’ are not different