Course Content
Cybersecurity Awareness for Corporate Teams

1.2 Common Threats in Corporate Environments

  • Business Email Compromise (BEC):
    A sophisticated scam where attackers compromise legitimate business email accounts
    to conduct unauthorized transfers of funds. BEC is often “malware-free,” relying
    entirely on social manipulation.
  • Insider Threats:

    • Malicious Insider:
      A disgruntled employee stealing IP (Intellectual Property) before leaving
      to a competitor.
    • Negligent Insider:
      A well-meaning employee who bypasses security policies
      (e.g., emailing sensitive data to a personal Gmail account)
      to “get the job done” faster.
  • Supply Chain Attacks:
    Attackers breach a third-party vendor (e.g., an HVAC provider or payroll processor)
    to gain access to your network. You are only as secure as your least secure vendor.