Business Email Compromise

Understand how business e-mail compromise attacks can work and the steps that can be taken to verify the authenticity of e-mail requests.

Duration: 15 minutes