In a recent conversation with a business owner, they disclosed that they were going through a BEC (Business Email Compromise) attack on their network. There are a lot of email threats out there, but this attack was worse than most. The attackers gained access to their email, monitored activity to see who they corresponded with […]