2019/20’s 10 biggest, boldest, and most brazen business email compromise scams

Proofpoint logo

Telling the difference between authentic emails and an impostor’s scam is not always easy. That’s because business email compromise (BEC) attacks prey on human nature, the innate psychological traits shared by everyone.

This whitepaper offers a roundup of the most high-profile (and low-minded) BEC and email account compromise (EAC) attacks of the last 12 months.

Download it now to understand how email scams work and know how they can be avoided.


ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.

For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.