Skip To Content

Be Cyber-Secure: Beware of These Business Email Scams

Steps you can take to defend against phishing, smishing and other forms of cyber threats

CYBER CRIMINALS SEND OUT a staggering number of phishing emails to businesses every year. They’re trying to trick employees into revealing proprietary and confidential data or taking an action that will benefit the criminals—and harm your business. They often use a tactic called spoofing—impersonating a legitimate business or person—in an attempt to fool employees into clicking a link, opening an attachment, changing account information or conducting a financial transaction. Such phishing attempts are usually called smishing when cyber criminals use SMS or messaging apps.

Switch to Accessibility Friendly View
Text reads: What is business email compromise? Here’s how cyber criminals can defraud your business and gain access to corporate and customer records. Illustration of a man wearing a suit, glasses and a hood sitting at a computer, and emails flying out of it.
Text reads: A cyber criminal sends a fraudulent email that appears to come from a senior executive, a familiar vendor or other trusted source. Illustration of a man wearing a suit, glasses and a hood sitting at a computer with an arrow pointing out of it, signifying a sent email.
Text reads: The email requests that the receiver take immediate action…. Illustration of an email with a red exclamation point, and an arrow pointing from it to two computers, one with a male and one with a female icon.
Text reads: The recipient falls for the scam…. Illustration of an email pointing to a computer that has turned red, signifying a user that has opened a fraudulent email.
Text reads: and processes the payment or transfers money to a fraudulent account. Illustration of a red computer that has opened a fraudulent email, pointing to a bank with money on the outside of it.
Text reads: The money goes to the cyber criminal. Illustration of a man wearing a suit, glasses and a hood sitting at a computer, with money.
The email may also contain malware, which if opened, allows the cyber criminal to steal vital company information, including customer records, for use in a future BEC attempt. Illustration of a man wearing a suit, glasses and a hood sitting at a computer, with files labeled confidential.

Clicking those links or opening those attachments can automatically install malware, which, depending on the type, could give the criminals access to your computer or device, install ransomware (in which malware infiltrates your system and cyber criminals hold your business hostage until a fee is paid), and even allow them to burrow further into your company's servers or the cloud. Let them in and they could steal your company’s confidential information and destroy the reputation you’ve worked hard to build with customers.

While the impact of such a business email compromise (BEC) can seem overwhelming, there are things you can consider doing to help protect your business, your customers and your employees from email scams. Consider these best practices:

  • Avoid clicking on links or attachments from untrusted sources.
  • Educate employees to be alert to emails, messaging and phone calls that may be fraudulent.
  • Use verified contact information from within the company’s internal contact management system when verifying requests to change information or transfer funds.
  • Require multiple-person approvals for account and financial change requests.
  • Encourage employees to ask questions and challenge suspicious activity before acting on requests.

Connect with an advisor and start a conversation about your goals.

9am - 9pm Eastern, Monday - Friday

Have questions for your financial advisor?

Connect with to continue the conversation.


You need to answer some questions first

Then we can provide you with relevant answers.

Get started