Course Content
Cybersecurity Awareness for Corporate Teams

1.2 Common Threats in Corporate Environments

  • Business Email Compromise (BEC): A highly sophisticated scam where attackers compromise legitimate corporate email accounts to conduct unauthorized fund transfers.

    BEC attacks are often “malware-free”, relying entirely on social manipulation rather than technical exploits.

  • Insider Threats: Security risks that originate from within the organization.
    • Malicious Insider: A disgruntled employee stealing IP (Intellectual Property) before leaving to join a competitor.
    • Negligent Insider: A well-meaning employee who bypasses security policies (e.g., emailing sensitive data to a personal Gmail account) to “get the job done” faster.
  • Supply Chain Attacks: Attackers compromise a trusted third-party vendor (such as an HVAC provider or payroll processor) to gain indirect access to your corporate network.

    You are only as secure as your least secure vendor.