A compromising crash – BEC cyberattack
About this video training:
Make sure to verify the source of sensitive request by phone or in person, even if it looks like a legitimate message.
An attacker can use your email account to send messages that can compromise your organization.
Please complete this training as soon as possible. We hope you enjoy!