A compromising crash – BEC cyberattack

About this video training:

Make sure to verify the source of sensitive request by phone or in person, even if it looks like a legitimate message.

An attacker can use your email account to send messages that can compromise your organization.

Please complete this training as soon as possible. We hope you enjoy!

Lesson