Business Email Compromise (BEC) has emerged as a critical concern for organisations, becoming one of the most financially devastating cyber threats in the UK and globally.
As BEC tactics evolve, they pose an increasing challenge not only for cybersecurity professionals but also for employees who are often the first line of defence.
Government reporting on cyber attacks has revealed that 84% of businesses and 83% of charities have experienced a phishing attack in the past 12 months (2023/24).
Recognising this, the National Cyber Security Centre has issued new guidance to help organisations strengthen their defences.
We’ll explore the nuances of BEC, the latest UK recommendations, and how you can protect your communications from this growing threat.
Understanding Business Email Compromise
Business Email Compromise (BEC), also known as Email Account Compromise (EAC), is a targeted form of phishing where criminals use email to deceive employees into transferring funds or sharing sensitive information.
Unlike broad phishing campaigns, BEC attacks are highly specific. They often involve meticulous research to convincingly impersonate trusted individuals or organisations.
BEC Attack Forms
BEC attacks can take several forms:
Executive impersonation: Attackers pose as high-ranking executives, requesting urgent wire transfers or access to confidential data.
Data theft: Attackers seek to obtain sensitive information such as employee tax forms or customer data.
Legal impersonation: Scammers pose as lawyers or legal representatives, often citing urgent, confidential matters.
What makes BEC especially dangerous is its ability to evade traditional email security measures.
These attacks often contain no malicious attachments or links, making them difficult for standard filters to detect.
“The sophisticated nature of BEC attacks means that organisations must adopt a multi-layered approach to email security. It's not just about technology but also about vigilance among staff.”
Recent statistics highlight the significant impact of BEC on UK and global organisations:
Global losses: The FBI reports that losses from BEC or EAC have surpassed $43 billion globally.
UK impact: According to the Cyber Security Breaches Survey 2024, 83% of UK businesses that suffered a cyber attack in 2022 identified phishing as the cause - with BEC playing a major role.
Growing threat: Losses from BEC attacks increased by 65% between July 2019 and December 2021.
Real estate fraud: Developer Sefri-Cime lost €38 million in a scam by an international fraud ring.
“BEC attacks are highly targeted and can cause significant financial losses. Companies need to enhance their verification processes, especially when dealing with high-value transactions.”
The guidance helps organisations boost cyber resilience, particularly in combating impersonation and fraud attempts.
1. Prioritising Cyber Security
The report found that 80% of UK businesses continue to rate cyber security as a high priority.
However, charity sector prioritisation has dropped significantly - from 82% in 2022 to 63% in 2024.
2. Implementing Technical Controls
The new guidance encourages several technical improvements:
83% of firms now use up-to-date malware protection (up from 76%).
73% apply admin rights restrictions (up from 67%).
75% use network firewalls (up from 66%).
54% have phishing response processes (up from 48%).
These figures reverse a trend of declining controls, especially among small businesses.
3. Staff Training and Awareness
Employee education is vital for preventing BEC:
Deliver frequent cyber awareness training.
Run simulated phishing tests.
Set policies for email and financial request handling.
4. Multi-Factor Authentication (MFA)
MFA is essential for protecting email accounts, particularly those of senior executives or finance teams.
Implementing MFA across accounts limits the risk of email account compromise - a common first step in BEC.
5. Email Authentication Protocols
To help prevent spoofed email messages, the guidance recommends implementing:
SPF (Sender Policy Framework)
DKIM (DomainKeys Identified Mail)
DMARC (Domain-based Message Authentication, Reporting, and Conformance)
6. Vendor Management
Since vendor fraud is a common BEC tactic, organisations should:
Verify any changes to supplier payment details via a secondary channel.
Use different communication channels for financial approvals.
Review and audit vendor communications regularly.
7. Incident Response Planning
Incident response plans should include procedures for:
Reporting suspicious messages and behaviour.
Freezing or reversing unauthorised payments.
Notifying internal stakeholders and law enforcement.
8. Regular Security Assessments
Security assessments help identify gaps in BEC readiness:
Conduct regular vulnerability scans and penetration tests.
Review email protection configurations.
Assess staff knowledge and adherence to processes.
9. Collaboration With Law Enforcement
The guidance encourages reporting BEC attempts to law enforcement such as Action Fraud.
This helps authorities track, investigate, and recover funds where possible.
“It's crucial for organisations to report BEC incidents to law enforcement quickly. This not only helps in potentially recovering lost funds but also aids in understanding and mitigating the broader threat landscape.”
BEC prevention is crucial for securing sensitive legal correspondence and transactions.
Compliance teams should work closely with IT and security leaders to make sure cyber controls meet both regulatory and operational needs.
Securing Email Threads to Prevent Impersonation
Securing email threads between your team and customers is critical for preventing BEC.
Secure email solutions with end-to-end encryption and multi-factor authentication (MFA) prevent impersonation by verifying identity at every step.
End-to-end encryption: Scrambles the content of emails and attachments, ensuring that only authorised recipients can read them - protecting against eavesdropping and impersonation.
Multi-factor authentication (MFA): Adds extra verification layers like SMS codes or custom Q&A prompts to confirm identity before access is granted.
This ensures that even if credentials are compromised, only verified individuals can read or respond to messages - making email threads secure and trusted.
These controls not only reduce BEC risk but also improve customer confidence in your communication security.
Key Takeaways
Business Email Compromise (BEC) continues to pose a major risk to UK organisations across sectors.
The financial and reputational consequences of a successful attack can be severe, making it critical to act.
UK government guidance offers a valuable roadmap for protection. Key takeaways include:
Prioritise cyber security organisation-wide.
Apply technical controls to stop impersonation attempts.
Train employees to recognise and report suspicious activity.
Meta Description: Learn how to prevent Business Email Compromise with new UK guidance and practical steps to protect your organisation from email impersonation threats.
Originally posted on 24 06 24
Last updated on June 20, 2025
Sabrina McClune is a Women in Tech Excellence 2022 finalist who writes extensively on cybersecurity, digital transformation, data protection, and digital identity. With a postgraduate degree in Digital Marketing (Distinction) and a First-Class Honours degree in English, she combines a strong academic foundation with professional expertise. At Beyond Encryption, Sabrina develops research-led content that supports financial and technology sectors navigating the complexities of the digital age.