{"id":15033,"date":"2024-10-08T09:54:05","date_gmt":"2024-10-08T13:54:05","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=15033"},"modified":"2025-06-06T11:28:33","modified_gmt":"2025-06-06T15:28:33","slug":"business-email-compromise","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/","title":{"rendered":"How can MSPs protect against business email compromise (BEC)?"},"content":{"rendered":"<p><em>October is\u00a0<a href=\"https:\/\/www.sherweb.com\/blog\/tag\/cybersecurity-awareness-month\/\">Cybersecurity Awareness Month<\/a>, and this year\u2019s theme, \u201cSecure Our World,\u201d reminds us that we all play a role in making the digital space safer. Throughout the month, we\u2019ll explore practical ways to strengthen your cybersecurity defenses\u2014whether it\u2019s by recognizing threats, securing your data or adopting new habits to protect your businesses and personal lives.<\/em><\/p>\n<p>With the surge in Business Email Compromise (BEC) and other <a href=\"https:\/\/www.sherweb.com\/blog\/security\/top-cyber-threats\/\">sophisticated cyber threats<\/a>, managed service providers (MSPs) face mounting pressure to protect clients\u2019 data and ensure secure communication channels. <a href=\"https:\/\/www.sherweb.com\/productivity\/microsoft-365\/\">Microsoft<\/a> tenants, including <a href=\"https:\/\/www.sherweb.com\/blog\/office-365\/15-cool-features-you-should-be-using-in-office-365\/\">Outlook<\/a>, are especially vulnerable as they\u2019re prime targets for attackers using <a href=\"https:\/\/www.sherweb.com\/blog\/security\/online-backup-role-phishing-email-ransomware-paradigm\/\">phishing<\/a>, <a href=\"https:\/\/www.malwarebytes.com\/social-engineering\">malware and social engineering<\/a> tactics. Fortunately, tools like <a href=\"https:\/\/www.sherweb.com\/security\/office-protect\/\">Office Protect offer advanced security<\/a> layers tailored specifically for Microsoft environments, providing MSPs with the resources needed to stay one step ahead of attackers.<\/p>\n<p>Let&#8217;s explore the critical role of email security for MSPs, the threats targeting Microsoft tenants and how Office Protect strengthens defense strategies.<\/p>\n<h2 style=\"text-align: center;\"><a href=\"https:\/\/info.sherweb.com\/msps-guide-to-cyber-insurance\">Are you covered in the event of a data breach? Download your free cyber insurance guide<\/a><\/h2>\n<h2>What is business email compromise?<\/h2>\n<p>BEC\u00a0is a form of cyberattack where hackers impersonate trusted figures, like CEOs or vendors, to deceive employees into transferring funds or sensitive data. <a href=\"https:\/\/www.fbi.gov\/how-we-can-help-you\/scams-and-safety\/common-frauds-and-scams\/business-email-compromise\">According to the FBI<\/a>, BEC losses reached over $2.4 billion last year alone. The rise in remote work and cloud dependence has only amplified this trend, with attackers constantly evolving tactics to bypass security.<\/p>\n<h2>What makes business email such a prime target?<\/h2>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-business-email-compromise-bec#:~:text=Business%20email%20compromise%20(BEC)%20is%20a%20type%20of%20cybercrime%20where,can%20use%20in%20another%20scam.\">BEC and email-based attacks<\/a> are lucrative for cybercriminals because they exploit human error and business processes. These attacks can result in massive financial losses and reputational damage, particularly for organizations that rely on Microsoft tenants like Outlook.<\/p>\n<ul>\n<li><strong>Direct access to sensitive data:<\/strong> Email accounts often store confidential business information, making them high-value targets.<\/li>\n<li><strong>Vulnerability to social engineering:<\/strong> Cybercriminals increasingly use BEC tactics to trick employees into actions that compromise security.<\/li>\n<\/ul>\n<h2>Why is cybersecurity crucial for MSPs?<\/h2>\n<p>MSPs are on the frontlines, protecting businesses from rising cyber threats and cybersecurity is integral to their success for several reasons:<\/p>\n<ul>\n<li><strong>Reputation:<\/strong> As trusted partners, MSPs must ensure that clients\u2019 data is secure. A breach not only harms the client but also the MSP\u2019s reputation.<\/li>\n<li><strong>Compliance:<\/strong> Many industries, like healthcare and finance, have stringent data protection standards. MSPs must align with these to offer compliant solutions.<\/li>\n<li><strong>Business growth:<\/strong> A robust security stance enhances client trust and can lead to more business opportunities.<\/li>\n<\/ul>\n<h2>Why MSPs need a strong cybersecurity strategy for protecting against BEC<\/h2>\n<p>MSPs are responsible for securing their clients\u2019 most critical data, and an email breach can have significant ripple effects. Here\u2019s why a robust cybersecurity approach is essential:<\/p>\n<ul>\n<li><strong>Building trust with clients:<\/strong> A solid security strategy reassures clients that their data is safe, strengthening business relationships.<\/li>\n<li><strong>Preventing costly downtime:<\/strong> Cyber incidents lead to downtime, which can cost clients both financially and in terms of productivity.<\/li>\n<li><strong>Maintaining compliance standards:<\/strong> Many industries require strict data protection measures, and MSPs must help clients stay compliant to avoid penalties.<\/li>\n<\/ul>\n<h2>How Office Protect defends against common threats to Microsoft tenants<\/h2>\n<p><a href=\"https:\/\/www.sherweb.com\/blog\/security\/what-is-office-protect\/\">Office Protect<\/a> provides comprehensive security tailored specifically for Microsoft tenants like Outlook, addressing the unique vulnerabilities they face. Here\u2019s how it helps:<\/p>\n<ul>\n<li><strong>Real-time threat detection:<\/strong> Office Protect continuously scans for suspicious activity within Microsoft environments, instantly detecting and neutralizing threats.<\/li>\n<li><strong>User monitoring and behavioral analysis:<\/strong> The tool tracks login locations, device types, and unusual behaviors, flagging any signs of compromised accounts.<\/li>\n<li><strong>Multi-factor authentication (MFA) enforcement:<\/strong> With MFA, even if attackers gain access to login credentials, they cannot easily bypass security.<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><a class=\"my-button\" href=\"https:\/\/scan.office-protect.com\/\">Get your free security assessment now!<\/a><\/p>\n<style>\n  <!--a.my-button{ background-color: #ed573c; color: #fff; font-family: Tahoma; font-size: 15px; font-weight: 800; font-style: normal; text-decoration: none; padding: 14px 15px; border: 0px solid #000; border-radius: 10px; display: inline-block; box-shadow: 0px 0px 10px 0px #2D2D2D; } a.my-button:hover{ background-color: #ef7363; } a.my-button:active{ transform: scale(0.95); }--><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\"><\/span><br \/><\/style>\n<h2>What Role Does AI Play in business email compromise?<\/h2>\n<p>As cybercriminals increasingly turn to sophisticated methods to execute BEC attacks, artificial intelligence (AI) has become a powerful tool in their arsenal. A recent study shows that <a href=\"https:\/\/www.securitymagazine.com\/articles\/100927-ai-is-responsible-for-40-of-business-email-compromise-bec-emails\">40% of BEC emails are generated by AI<\/a>. Here\u2019s how cybercriminals are leveraging artificial intelligence by malicious actors to carry out these deceptive schemes:<\/p>\n<ul>\n<li><strong>Automated phishing campaigns:<\/strong> AI can generate realistic phishing emails that closely mimic legitimate communications, making it easier for attackers to trick employees into divulging sensitive information or clicking on malicious links. These AI-generated messages often bypass traditional email filters, increasing the likelihood of successful attacks.<\/li>\n<li><strong>Deep learning for targeting:<\/strong> Attackers utilize AI algorithms to analyze company data, social media profiles, and other online information to identify potential targets within an organization. This deep learning approach enables cybercriminals to tailor their attacks, making them more convincing and harder to detect.<\/li>\n<li><strong>Impersonation techniques:<\/strong> AI can be used to clone writing styles, speech patterns, and even voice through deepfake technology. By impersonating a trusted executive or colleague, attackers can manipulate employees into making unauthorized transactions or sharing sensitive data.<\/li>\n<li><strong>Scaling attack efforts:<\/strong> The efficiency of AI allows cybercriminals to scale their BEC campaigns rapidly. Instead of manually crafting individual emails, they can automate the process, sending thousands of customized phishing attempts in a short period. This scalability increases the chances of breaching organizational defenses.<\/li>\n<li><strong>Continuous adaptation:<\/strong> AI systems can analyze the effectiveness of BEC attacks in real-time, enabling attackers to refine their strategies and improve their tactics. This adaptability means that as defenses strengthen, so too do the methods used to bypass them.<\/li>\n<\/ul>\n<p>Understanding how AI is being exploited in business email compromise is essential for MSPs and organizations looking to enhance their cybersecurity measures. By recognizing these tactics, they can better equip themselves to defend against this pervasive threat.<\/p>\n<p>MSPs also need tools that keep up with AI-driven threats. <a href=\"https:\/\/www.sherweb.com\/security\/ironscales\/\">IRONSCALES<\/a> uses machine learning to detect and respond to phishing and business email compromise attempts in real time, before users even see them. It&#8217;s a smart addition to any MSP\u2019s email security stack.<\/p>\n<div style=\"text-align: center;\">\n<p><iframe loading=\"lazy\" title=\"Cybersecurity _ AI and cybersecurity\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/kpVPZcthF84?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<\/div>\n<p style=\"text-align: center;\"><em>Before exploring best practices, hear from Sherweb\u2019s Cybersecurity Technical Fellow Roddy Bergeron about how AI is shaping the cybersecurity landscape and what MSPs need to do to keep up.<\/em><\/p>\n<h2>Key cybersecurity best practices for MSPs<\/h2>\n<p>To get the most from Office Protect, MSPs can follow these best practices:<\/p>\n<ol>\n<li><strong>Regular security training<\/strong>: Equip clients and staff to recognize phishing and social engineering attempts.<\/li>\n<li><strong>Frequent security audits<\/strong>: Ensure configurations are optimized, keeping Office Protect updated with the latest threat intelligence.<\/li>\n<li><strong>Enforce MFA and strong password policies<\/strong>: A simple yet effective barrier against unauthorized access.<\/li>\n<li><strong>Monitor real-time alerts<\/strong>: Respond quickly to any flagged behavior in Office Protect\u2019s dashboard to prevent potential breaches.<\/li>\n<\/ol>\n<h2>Common cybersecurity missteps MSPs should avoid<\/h2>\n<p>To effectively combat BEC, MSPs need to avoid common pitfalls:<\/p>\n<ul>\n<li><strong>Underestimating social engineering:<\/strong> BEC often relies on manipulation, so investing in training employees to recognize social engineering tactics is crucial.<\/li>\n<li><strong>Neglecting regular security audits:<\/strong> Consistent audits uncover vulnerabilities that might otherwise be exploited.<\/li>\n<li><strong>Relying solely on traditional security measures:<\/strong> Legacy systems lack the advanced threat detection capabilities found in modern cloud infrastructure.<\/li>\n<\/ul>\n<h2>Benefits of expanding your cybersecurity stack with Office Protect<\/h2>\n<p>Office Protect not only secures clients\u2019 Microsoft tenants but also adds value to MSP services:<\/p>\n<ul>\n<li><strong>Increases client confidence:<\/strong> Providing robust protection builds trust and positions MSPs as proactive security partners.<\/li>\n<li><strong>Reduces risk of downtime and financial losses:<\/strong> By safeguarding against attacks, clients maintain business continuity.<\/li>\n<li><strong>Strengthens compliance posture:<\/strong> Office Protect simplifies adherence to data protection standards, meeting industry requirements.<\/li>\n<\/ul>\n<h2>Take your cybersecurity to the next level<\/h2>\n<p>Looking for more cybersecurity guidance and resources? Ready to implement multi-factor authentication but not sure where to start? Explore Sherweb\u2019s full\u00a0<a href=\"https:\/\/www.sherweb.com\/security\/\">portfolio of solutions<\/a>.<\/p>\n<p><em>Want to stay ahead in cybersecurity? Follow our\u00a0<a href=\"https:\/\/www.sherweb.com\/blog\/tag\/cybersecurity-awareness-month\/\">Cybersecurity Awareness blog series<\/a>\u00a0throughout the month for practical insights and actionable tips. Together, we can enhance our cybersecurity resilience and create a safer digital environment for our businesses and communities.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>October is\u00a0Cybersecurity Awareness Month, and this year\u2019s theme, \u201cSecure Our World,\u201d remin","protected":false},"author":177,"featured_media":25114,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[807,826,919,934],"class_list":["post-15033","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-business-email","tag-office-protect","tag-cybersecurity","tag-cybersecurity-awareness-month"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why your business email should be in the cloud<\/title>\n<meta name=\"description\" content=\"Let&#039;s take a look at why the cloud is best solutions for business email and the benefits you\u2019ll receive from taking the leap.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why your business email should be in the cloud\" \/>\n<meta property=\"og:description\" content=\"Let&#039;s take a look at why the cloud is best solutions for business email and the benefits you\u2019ll receive from taking the leap.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-08T13:54:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T15:28:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Email-1200x480-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"460\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/business-email-compromise\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/business-email-compromise\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"How can MSPs protect against business email compromise (BEC)?\",\"datePublished\":\"2024-10-08T13:54:05+00:00\",\"dateModified\":\"2025-06-06T15:28:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/business-email-compromise\\\/\"},\"wordCount\":1286,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/business-email-compromise\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Email-1200x480-1.png\",\"keywords\":[\"Business Email\",\"Office Protect\",\"Cybersecurity\",\"Cybersecurity Awareness Month\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/business-email-compromise\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/business-email-compromise\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/business-email-compromise\\\/\",\"name\":\"Why your business email should be in the cloud\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/business-email-compromise\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/business-email-compromise\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Email-1200x480-1.png\",\"datePublished\":\"2024-10-08T13:54:05+00:00\",\"dateModified\":\"2025-06-06T15:28:33+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"Let's take a look at why the cloud is best solutions for business email and the benefits you\u2019ll receive from taking the leap.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/business-email-compromise\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/business-email-compromise\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/business-email-compromise\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Email-1200x480-1.png\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Email-1200x480-1.png\",\"width\":1200,\"height\":460,\"caption\":\"business email compromise (BEC)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/business-email-compromise\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How can MSPs protect against business email compromise (BEC)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why your business email should be in the cloud","description":"Let's take a look at why the cloud is best solutions for business email and the benefits you\u2019ll receive from taking the leap.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/","og_locale":"en_US","og_type":"article","og_title":"Why your business email should be in the cloud","og_description":"Let's take a look at why the cloud is best solutions for business email and the benefits you\u2019ll receive from taking the leap.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2024-10-08T13:54:05+00:00","article_modified_time":"2025-06-06T15:28:33+00:00","og_image":[{"width":1200,"height":460,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Email-1200x480-1.png","type":"image\/png"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"How can MSPs protect against business email compromise (BEC)?","datePublished":"2024-10-08T13:54:05+00:00","dateModified":"2025-06-06T15:28:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/"},"wordCount":1286,"commentCount":0,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Email-1200x480-1.png","keywords":["Business Email","Office Protect","Cybersecurity","Cybersecurity Awareness Month"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/","url":"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/","name":"Why your business email should be in the cloud","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Email-1200x480-1.png","datePublished":"2024-10-08T13:54:05+00:00","dateModified":"2025-06-06T15:28:33+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Let's take a look at why the cloud is best solutions for business email and the benefits you\u2019ll receive from taking the leap.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Email-1200x480-1.png","contentUrl":"\/blog\/wp-content\/uploads\/Email-1200x480-1.png","width":1200,"height":460,"caption":"business email compromise (BEC)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"How can MSPs protect against business email compromise (BEC)?"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Business Email","Office Protect","Cybersecurity","Cybersecurity Awareness Month"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/15033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=15033"}],"version-history":[{"count":13,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/15033\/revisions"}],"predecessor-version":[{"id":25521,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/15033\/revisions\/25521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/25114"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=15033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=15033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=15033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}