BEC is when a cybercriminal hacks into a corporate email and impersonates the owner/user of the email domain intending to entice the recipient to make a wire transfer or other electronic payment to a bank account controlled by the cybercriminal. In some cases the cybercriminal will request sensitive information to engineer attacks within the organization to obtain money illegally.

The Selection Process
Selecting a qualified candidate involves more than just conducting interviews. Implementing a good selection process will save your organization time

