Skip to Main Content
Online Access

Online Access

BankSouth offers immediate and easy access to your mobile and online banking. You can also apply for and review your ReadyLoan mortgage application.

Learn More

Banking Resources

Banking Resources

Every financial situation is unique. Explore our many resources available to you to make wise decisions when it comes to managing your money.

Be Smart With Money

Mortgage

Mortgage

For over ten years, BankSouth has helped thousands of families finance their homes.  We know how daunting this may be, but we take the worry and hassle out of the process.

Learn MoreStart Your Application

Business Email Compromise: What It Is and How to Defend Your Business

May 29, 2025 Small Business
email being compromised on a phone

According to the 2024 FBI Internet Crime Report, Business Email Compromise losses totaled $2.77 billion, making Business Email Compromise (BEC) one of the fastest growing and costliest cyber threats facing businesses today.

Fraudsters impersonate legitimate contacts, including executives, vendors, or partners to trick employees into sending money or sensitive data. Awareness and preparation are your best defenses.

What is Business Email Compromise?

Business Email Compromise (BEC) is a form of cybercrime where attackers use social engineering and spoofed or hacked emails to impersonate trusted parties. Their goal? Convince you to wire funds or share confidential information.

Common scenarios include:

  • CEO Fraud: An attacker poses as the CEO and sends an urgent email to the finance team requesting a wire transfer.
  • Vendor Spoofing: A fake invoice is sent from what appears to be a regular vendor, with new payment instructions.
  • Account Compromise: A real employee’s email is hacked and used to request changes to payroll or billing information.

These scams are timed strategically—often around holidays, quarter-end closings, or leadership travel—when employees may be rushed or distracted.

How to Prevent BEC

Employees are your first line of defense. Prevention starts with awareness and layered defenses. Here’s how you can reduce your risk:

  • Train employees regularly: Ongoing cybersecurity awareness training helps your team spot red flags and think critically before clicking.
  • Mark external emails clearly: Configure your email system to display a banner or tag at the top of all messages received from outside your organization. Change the look often so employees don’t get used to it and start ignoring it.
  • Enable Multi-Factor Authentication (MFA): This simple step dramatically reduces the chances of email accounts being compromised.
  • Verify payment requests: Always confirm changes to vendor payment details or payroll information by calling a known contact using a verified phone number.
  • Set internal controls: Require dual approval for large transfers and limit who can authorize payments.
  • Keep systems updated: Ensure all devices are running the latest software and have strong endpoint protection in place.
  • Limit public information: Be cautious about what you share on your website or social media—criminals use these details to craft believable scams.

How to Spot a Compromised Email

BEC emails are often well-written and look legitimate, but subtle clues can reveal their true nature. Here are red flags to watch for:

  • Misspelled or unusual sender addresses: An email might come from “[email protected]” instead of yourcompany.com.
  • Urgent or secretive requests: “I need this wire processed within the hour. Don’t tell anyone until it’s done.”
  • Unusual timing or tone: An executive who rarely emails the accounting department suddenly requests a transfer late on a Friday.
  • Request to change financial information: Always confirm these requests through a trusted communication channel or in-person.
  • Suspicious attachments or links: Don’t open attachments or click links unless you are 100% sure they’re safe.

Encourage employees to trust their instincts—if something feels off, it’s worth checking.

What to Do If It Happens to Your Business

If you suspect a BEC attack—whether successful or attempted—take immediate action:

  1. Cease communication with the suspected fraudster.
  2. Alert your IT team or cybersecurity provider to investigate and secure your systems.
  3. Notify your bank right away. If money has been transferred, the sooner you act, the better your chances of recovery.
  4. Report the incident to the FBI’s Internet Crime Complaint Center (IC3): https://www.ic3.gov
  5. Preserve all related emails, headers, and data to assist with the investigation.
  6. Review and strengthen your security policies to avoid repeat incidents.

BEC attacks are becoming more sophisticated, but with vigilance and strong security practices, your business can stay protected. Education is the first step.

Recent Posts

View our latest news and get the latest industry updates on our blog.

business email compromise
Fraudsters are constantly evolving their tactics, and this month has been no different. From intercepted business emails, phone calls, or faulty QR codes, it's more important than ever to stay informed this summer. This month, we’re spotlighting three trending scams:...
Cody Dalrymple Graduates from Georgia Banking School
GREENSBORO, GA – BankSouth congratulates Cody Dalrymple, VP Internal Auditor, on his recent graduation from Georgia Banking School. The graduation ceremony took place on May 2 at the University of Georgia Center for Continuing Education and Hotel in Athens, Ga....
young woman banking on her cell phone
When it comes to choosing a checking account, you shouldn’t have to sacrifice convenience, affordability, or flexibility. At BankSouth, our suite of checking account options is built to serve the everyday needs of Georgians — whether you're opening your very...