Requiring a second factor for users to authenticate upon logging into email and other systems could very well prevent an instance of business email compromise. When attempting compromise, malicious actors try to log into a business email account. If a code in a text message or QR code is required to proceed further, they could be stopped in their tracks.
Our Business Email Compromise Response Process
If you find yourself suspecting or dealing with business email compromise, here’s how we help.
All of our incident response cases start with a free consultation. We discuss the situation with you to determine if incident response services are recommended.
Our team of experienced investigators then dive in to your systems to first ensure malicious actors no longer have access and the proper protections like multi-factor authentication are in place. We then determine what happened and to what extent.
Based on the findings and your privacy counsel’s request, we create a full report and walk though it with you so you fully understand our conclusions and recommended next steps.
While many cases do not require expert testimony, it’s often the most important component of those that do. Similar to the report review, we provide clear and comprehensive explanation throughout court proceedings.