Atlas Systems Named a Representative Vendor in 2025 Gartner® Market Guide for TPRM Technology Solutions → Read More

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Business Email Compromise (BEC)

Last updated: Nov 26, 2025

Glossary › Business Email Compromise (BEC)

What is Business Email Compromise (BEC)?

BEC is a form of cybercrime where attackers manipulate trusted communication channels to authorize fraudulent payments, transfer sensitive information, or gain system access. In vendor ecosystems, compromised supplier accounts can trigger large-scale financial losses or unauthorized data exposure. Detection requires email security controls, identity protections, and verification steps for financial requests.

FAQs

How does BEC affect third-party relationships?

A compromised vendor account can spread fraudulent invoices or phishing attempts to all connected customers.

Is BEC preventable through technical controls alone?

No. It requires a combination of security controls, process controls, and employee verification practices.

What signals indicate a possible BEC attempt?

Unexpected wire transfer instructions, domain lookalikes, and urgent messages bypassing normal workflows.

robot-human

Reinventing TPRM with
ComplyScore®

Learn how leading risk teams reduce cyber risk and protect compliance faster.

Third-party delays hurt compliance. Automate onboarding and stay ahead with ComplyScore®.