{"id":4679,"date":"2021-09-20T07:43:23","date_gmt":"2021-09-20T12:43:23","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=4679"},"modified":"2021-09-17T17:10:40","modified_gmt":"2021-09-17T22:10:40","slug":"how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/","title":{"rendered":"How to Prevent Business Email Compromise Incidents: 7 Ways to Lower Your Risk Level"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-4680\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo-300x183.jpg\" alt=\"A white speech bubble containing an @ suspended on a fish hook, symbolizing phishing and email scams.\" width=\"300\" height=\"183\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo-300x183.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo-1024x626.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo-768x469.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo-1536x939.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo-2048x1252.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo-200x122.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>You get an email one afternoon from the CEO of the company you work for telling you that he\u2019s in the process of finalizing a top-secret acquisition and needs you to wire funds ASAP to close the deal. How do you respond?<\/p>\n<p>If you think this scenario seems suspect, you have good instincts. It has all the hallmarks of a business email compromise (BEC) attack \u2013 a type of <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-if-you-take-the-bait-for-a-phishing-scam\/\" target=\"_blank\" rel=\"noopener\">phishing scheme<\/a> in which hackers take over or spoof corporate email accounts and attempt to trick victims (often employees or clients of the person they\u2019re imitating) into disclosing sensitive information or sending money, according to the Infosec article \u201c<a href=\"https:\/\/resources.infosecinstitute.com\/topic\/5-real-world-examples-business-email-compromise\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">5 real-world examples of business email compromise<\/a>.\u201d<\/p>\n<p>BEC or email account compromise (EAC) attacks cost victims more than any other type of cybercrime, according to the <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">2020 Internet Crime Report<\/a> from the FBI\u2019s Internet Crime Complaint Center (IC3). In 2020, the IC3 received 19,369 complaints about BEC\/EAC attacks that involved adjusted losses of over $1.8 billion.<\/p>\n<p>Given how staggeringly expensive a business email compromise incident can be, it\u2019s advisable to proactively take steps to prevent hackers from utilizing this tactic to defraud your business. Leveraging the following strategies can help prevent business email compromise incidents.<\/p>\n<h2>1. Train your employees to recognize BEC scams.<\/h2>\n<p>Your <a href=\"https:\/\/www.stratospherenetworks.com\/employee-security-awareness.html\" target=\"_blank\" rel=\"noopener\">employee security awareness training<\/a> sessions should include information on how to spot phishing emails and the procedure for responding to suspicious messages (e.g., reporting them to your security team), according to a <a href=\"https:\/\/www.ic3.gov\/Media\/Y2020\/PSA200406\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">public service announcement from the IC3<\/a>.<\/p>\n<p>While BEC scams used to typically involve a hacker spoofing or taking over the email account of a CEO or CFO and asking for wire payments, they\u2019ve evolved over the years, according to the 2020 Internet Crime Report. Cybercriminals might also pretend to be vendors or lawyers and ask for gift cards or W-2 information.<\/p>\n<p>Other red flags include an emphasis on urgency, requests to keep the interaction secret, and the email coming from a domain name that looks legit but is off by one letter, according to the Deloitte article \u201c<a href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/advisory\/articles\/five-ways-mitigate-risk-business-email-compromise.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">5 ways to mitigate the risks of business email compromise attacks<\/a>.\u201d<\/p>\n<h2>2. Implement multi-factor authentication (MFA) for all company email accounts.<\/h2>\n<p>Having <a href=\"https:\/\/www.stratospherenetworks.com\/why-your-business-needs-multi-factor-authentication.html\" target=\"_blank\" rel=\"noopener\">MFA in place<\/a> is a must if you haven\u2019t already deployed it. Also called <a href=\"https:\/\/www.stratospherenetworks.com\/two-factor-authentication.html\" target=\"_blank\" rel=\"noopener\">two-factor authentication<\/a>, this cybersecurity solution adds an extra layer of protection on top of passwords and makes it much harder for hackers to take over your team members\u2019 email accounts, according to the CSO article \u201c<a href=\"https:\/\/www.csoonline.com\/article\/3600793\/14-tips-to-prevent-business-email-compromise.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">14 tips to prevent business email compromise<\/a>.\u201d<\/p>\n<h2>3. Add banners or flags to external emails.<\/h2>\n<p>Alert recipients in either the subject or the body with a warning banner for emails that come from senders outside of your organization, as advised by the <a href=\"https:\/\/www.cisecurity.org\/white-papers\/security-primer-business-email-compromise\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Center for Internet Security (CIS)<\/a>. You can usually achieve this via transport rules for inbound messages on your email server.<\/p>\n<h2>4. Install an email filtering solution.<\/h2>\n<p>With <a href=\"https:\/\/www.stratospherenetworks.com\/email-spam.html\" target=\"_blank\" rel=\"noopener\">email or spam filtering<\/a> in place, you can stop messages with common characteristics of phishing scams as well as those that come from suspicious IPs from landing in your staff members\u2019 inboxes, according to the CIS.<\/p>\n<h2>5. Establish a formal process for financial transactions that involves verification in person or via phone call.<\/h2>\n<p>The IC3 advises creating a workflow for all payments that involves calling a known phone number or confirming in person that the request is legitimate.<\/p>\n<h2>6. Stop utilizing legacy email protocols.<\/h2>\n<p>Older protocols such as IMAP, SMTP and POP can give hackers a way to get around MFA, according to CSO.<\/p>\n<h2>7. Block automatic forwarding to external email addresses.<\/h2>\n<p>This is a common part of many BEC scams, according to the IC3. After taking over an account, hackers might set up automatic forwarding of any messages containing financial information to an external email address.<\/p>\n<p>Ultimately, business email compromise schemes are common and incredibly costly. It makes sense to invest in preventive measures and avoid the huge headache (financial and otherwise) that\u2019s in store for your organization if one of your staff members falls for a fraudulent message.<\/p>\n<p>If you have any questions about how to prevent business email compromise, our security team is available to assist you. Our comprehensive portfolio of <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"noopener\">managed cybersecurity services<\/a> includes solutions that can lower your BEC attack risk level, such as email filtering, two-factor authentication and employee security awareness training.<\/p>\n<p>For details, just call 877-599-3999 or email <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a> to connect with our security specialists.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You get an email one afternoon from the CEO of the company you work for telling you that he\u2019s in the process of finalizing a top-secret acquisition and needs you to wire funds ASAP to close the deal. How do &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":4680,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-4679","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>How to Prevent Business Email Compromise Incidents<\/title>\n<meta name=\"description\" content=\"Business email compromise (BEC) attacks are a common and costly type of cybercrime. Take these steps to lower your risk of becoming a victim.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Prevent Business Email Compromise Incidents\" \/>\n<meta property=\"og:description\" content=\"Business email compromise (BEC) attacks are a common and costly type of cybercrime. Take these steps to lower your risk of becoming a victim.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-20T12:43:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2215\" \/>\n\t<meta property=\"og:image:height\" content=\"1354\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"How to Prevent Business Email Compromise Incidents: 7 Ways to Lower Your Risk Level\",\"datePublished\":\"2021-09-20T12:43:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/\"},\"wordCount\":741,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo.jpg\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/\",\"name\":\"How to Prevent Business Email Compromise Incidents\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo.jpg\",\"datePublished\":\"2021-09-20T12:43:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Business email compromise (BEC) attacks are a common and costly type of cybercrime. Take these steps to lower your risk of becoming a victim.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo.jpg\",\"width\":2215,\"height\":1354,\"caption\":\"A white speech bubble containing an @ suspended on a fish hook, symbolizing phishing and email scams.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Prevent Business Email Compromise Incidents: 7 Ways to Lower Your Risk Level\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"How to Prevent Business Email Compromise Incidents","description":"Business email compromise (BEC) attacks are a common and costly type of cybercrime. Take these steps to lower your risk of becoming a victim.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/","og_locale":"en_US","og_type":"article","og_title":"How to Prevent Business Email Compromise Incidents","og_description":"Business email compromise (BEC) attacks are a common and costly type of cybercrime. Take these steps to lower your risk of becoming a victim.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2021-09-20T12:43:23+00:00","og_image":[{"width":2215,"height":1354,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"How to Prevent Business Email Compromise Incidents: 7 Ways to Lower Your Risk Level","datePublished":"2021-09-20T12:43:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/"},"wordCount":741,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo.jpg","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/","name":"How to Prevent Business Email Compromise Incidents","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo.jpg","datePublished":"2021-09-20T12:43:23+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Business email compromise (BEC) attacks are a common and costly type of cybercrime. Take these steps to lower your risk of becoming a victim.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/09\/email-phishing-stock-photo.jpg","width":2215,"height":1354,"caption":"A white speech bubble containing an @ suspended on a fish hook, symbolizing phishing and email scams."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-business-email-compromise-incidents-7-ways-to-lower-your-risk-level\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Prevent Business Email Compromise Incidents: 7 Ways to Lower Your Risk Level"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4679"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4679\/revisions"}],"predecessor-version":[{"id":4682,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4679\/revisions\/4682"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/4680"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}