Response procedures for BEC attacks including wire fraud attempts and executive impersonation.
Guide for handling BEC incidents from detection through financial recovery attempts and legal engagement.
Determine the type and status of BEC attack.
Attempt to halt or recover fraudulent transfers.
Secure compromised or targeted accounts.
Understand how the attack occurred.
Address legal and compliance requirements.