: Requests that deviate from standard business procedures, such as a CEO asking an assistant to buy gift cards, are common lures. Investigating a Suspected Incident
Detecting a BEC attempt requires looking for psychological and technical anomalies: : Requests that deviate from standard business procedures,
: Attackers use "lookalike" domains (e.g., company-inc.com instead of companyinc.com ) or spoofed display names to appear legitimate. : Requests that deviate from standard business procedures,