Understand how business e-mail compromise attacks can work and the steps that can be taken to verify the authenticity of e-mail requests.Date last reviewed: 24/08/21
By the end of this lesson, the users will be able to:- identify how business email compromise fraud can occur, - recognise the risks and impact of data loss,- protect their email account(s),- spot the signs of a compromised email,- verify the authenticity of email requests.