{"id":2547,"date":"2024-01-22T09:18:44","date_gmt":"2024-01-22T09:18:44","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=2547"},"modified":"2026-05-04T13:52:55","modified_gmt":"2026-05-04T12:52:55","slug":"business-email-compromise-bec-attacks","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/","title":{"rendered":"Business Email Compromise (BEC) Attacks"},"content":{"rendered":"\n<p>Business Email Compromise (BEC) is a devious and sophisticated scam that targets businesses and individuals who wish to defraud them. This immoral activity is commonly carried out by threat actors who compromise legitimate business email accounts through social engineering or computer intrusion techniques. The objective of these threat actors is to conduct unauthorised funds transfers to accounts they are in control of.<\/p>\n\n\n\n<p>BEC attacks have increased rapidly over the years and are evolving past simple email account compromise rooted in social engineering tactics. <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\">According to the Microsoft Digital Defence Report, a staggering 156,000 BEC attempts were detected daily between April 2022 to April 2023<\/a><sup data-fn=\"b0d0063e-6beb-47c9-b66f-b4d7d29ad997\" class=\"fn\"><a href=\"\/#b0d0063e-6beb-47c9-b66f-b4d7d29ad997\" id=\"b0d0063e-6beb-47c9-b66f-b4d7d29ad997-link\">1<\/a><\/sup>. These attacks are becoming more sophisticated and harder to detect.<\/p>\n\n\n\n<div style=\"height:39px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-common-bec-attack-activity\">Common BEC Attack Activity<\/h2>\n\n\n\n<div style=\"height:19px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Financial Fraud<\/mark><\/h3>\n\n\n\n<p>Microsoft experts have observed that attackers create domain impersonations to trick users into thinking they are engaging with legitimate third parties for financial transactions. Attackers compromise the third party and respond through the same email thread to request money transfers. It is challenging to detect these attacks as they usually originate from genuine third-party email addresses.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2024\/01\/Website-landscape-images-7.png\" alt=\"paper boats on blue bacground\" class=\"wp-image-2554\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Lateral Movement Through Internal Phishing<\/mark><\/h3>\n\n\n\n<p>Many threat actors launch internal phishing campaigns after compromising identities with AiTM (Identifying Adversary-in-the-Middle). It is observed by Microsoft experts that largescale internal phishing campaigns have targeted over 8,000 recipients. These emails are sent internally and from legitimate senders, which increases the likelihood that users will open them and be fooled by the fraud.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Mass Spam Mailing Activity<\/mark><\/h3>\n\n\n\n<p>This attack focusses on disrupting users through a \u2019Denial-of-Service&rsquo; strategy. Attackers subscribe the victims email address to multiple lists, forums, message boards, and newsletters. The victim will then receive an overwhelming number of emails, which sometimes exceeds 1000 per minute. When this happens, the victim is often distracted, frustrated, and unable to notice legitimate warning or authentication messages in their flooded inbox.<\/p>\n\n\n\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How BEC is Evolving<\/h2>\n\n\n\n<p>BEC attacks are evolving, along with the skills of the threat actors. Since cloud services continue to advance through innovative breakthroughs, threat actors are adapting their social engineering techniques and use of technology to carry out more sophisticated and costly BEC attacks. The success of these attacks is due to the growing targeting of Cloud based infrastructure, exploitation of trusted business relationships, and development of more specialised skills by the threat actors.<\/p>\n\n\n\n<p>Increasing intelligence sharing across the public and private sectors will improve our collective ability to identify these attacks and enable a faster and more impactful response against the threat actors behind these attacks.<\/p>\n\n\n\n<div style=\"height:48px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Other Types of BEC Attacks<\/mark><\/h3>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#47ceb9\" class=\"has-inline-color\">Direct Email Compromise (DEC)<\/mark> &#8211; <\/strong>Compromised email accounts are used to socially engineer in-house or third-party accounting roles to wire funds to the attacker\u2019s bank account or change payment information for an existing account.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#47ceb9\" class=\"has-inline-color\">Vendor Email Compromise (VEC)<\/mark> &#8211; <\/strong>Social engineering of an existing supplier relationship by hijacking a payment-related email and impersonating company employees to convince a supplier to redirect outstanding payment to an illicit bank account.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#47ceb9\" class=\"has-inline-color\">False Invoice Scam<\/mark> &#8211; <\/strong>A mass social engineering scam that exploits well-known business brands to convince companies to pay fake invoices.<\/p>\n\n\n\n<div style=\"height:48px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Stop BEC Attacks with XDR<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Microsoft Defender allows you to automatically disrupt advanced attacks like ransomware and BEC campaigns. It uses high confidence <a>eXtended<\/a> Detection and Response (XDR) signals across endpoints, identities, email, and SaaS apps to stop attack progression and limit the impact to organisations.<\/p>\n\n\n\n<p>Business Email Compromise attacks are common and ever evolving. To keep your organisation safe, it is crucial to follow a strict plan to keep attackers at bay. Need help strengthening your infrastructure? Contact us at <a href=\"mailto:info@cwsi.co.uk\">info@cwsi.co.uk<\/a> to discuss options and find out how we can support you to leave cyberthreats in the past.<\/p>\n\n\n\n<p>Content originated from the Microsoft Digital Defence Report&nbsp;<\/p>\n\n\n<ol class=\"wp-block-footnotes\"><li id=\"b0d0063e-6beb-47c9-b66f-b4d7d29ad997\">Microsoft Digital Defence Report 2023 <a href=\"#b0d0063e-6beb-47c9-b66f-b4d7d29ad997-link\" aria-label=\"Aller \u00e0 la note de bas de page 1\">\u21a9\ufe0e<\/a><\/li><\/ol>","protected":false},"excerpt":{"rendered":"<p>Business Email Compromise (BEC) is a devious and sophisticated scam that targets businesses and individuals who wish to defraud them. This immoral activity is commonly carried out by threat actors who compromise legitimate business email accounts through social engineering or computer intrusion techniques. The objective of these threat actors is to conduct unauthorised funds transfers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8588,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":"[{\"content\":\"Microsoft Digital Defence Report 2023\",\"id\":\"b0d0063e-6beb-47c9-b66f-b4d7d29ad997\"}]"},"categories":[93,4],"tags":[],"sector":[],"solution":[308],"class_list":["post-2547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-our-voice","solution-secure-operations"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Business Email Compromise (BEC) Attacks - CWSI<\/title>\n<meta name=\"description\" content=\"Business Email Compromise (BEC) is a devious and sophisticated scam that targets businesses and individuals who execute transfers of funds.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business Email Compromise (BEC) Attacks\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-22T09:18:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-04T12:52:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/05\/iStock-944060494-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1596\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"fluroltd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/business-email-compromise-bec-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/business-email-compromise-bec-attacks\\\/\"},\"headline\":\"Business Email Compromise (BEC) Attacks\",\"datePublished\":\"2024-01-22T09:18:44+00:00\",\"dateModified\":\"2026-05-04T12:52:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/business-email-compromise-bec-attacks\\\/\"},\"wordCount\":616,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/business-email-compromise-bec-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iStock-944060494-scaled.jpg\",\"articleSection\":[\"Insights\",\"Our Voice\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/business-email-compromise-bec-attacks\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/business-email-compromise-bec-attacks\\\/\",\"name\":\"Business Email Compromise (BEC) Attacks - CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/business-email-compromise-bec-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/business-email-compromise-bec-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iStock-944060494-scaled.jpg\",\"datePublished\":\"2024-01-22T09:18:44+00:00\",\"dateModified\":\"2026-05-04T12:52:55+00:00\",\"description\":\"Business Email Compromise (BEC) is a devious and sophisticated scam that targets businesses and individuals who execute transfers of funds.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/business-email-compromise-bec-attacks\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/business-email-compromise-bec-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/business-email-compromise-bec-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iStock-944060494-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iStock-944060494-scaled.jpg\",\"width\":2560,\"height\":1596,\"caption\":\"Shot of two businessmen having a discussion in an office\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/business-email-compromise-bec-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business Email Compromise (BEC) Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#\\\/schema\\\/person\\\/870becf0b1e6869361f9510f90f8ce2a\",\"name\":\"fluroltd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"caption\":\"fluroltd\"},\"sameAs\":[\"https:\\\/\\\/cwsisecurity.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Business Email Compromise (BEC) Attacks - CWSI","description":"Business Email Compromise (BEC) is a devious and sophisticated scam that targets businesses and individuals who execute transfers of funds.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/","og_locale":"fr_FR","og_type":"article","og_title":"Business Email Compromise (BEC) Attacks","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/","og_site_name":"CWSI","article_published_time":"2024-01-22T09:18:44+00:00","article_modified_time":"2026-05-04T12:52:55+00:00","og_image":[{"width":2560,"height":1596,"url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/05\/iStock-944060494-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"fluroltd","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/"},"headline":"Business Email Compromise (BEC) Attacks","datePublished":"2024-01-22T09:18:44+00:00","dateModified":"2026-05-04T12:52:55+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/"},"wordCount":616,"publisher":{"@id":"https:\/\/cwsisecurity.com\/fr\/#organization"},"image":{"@id":"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/05\/iStock-944060494-scaled.jpg","articleSection":["Insights","Our Voice"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/","url":"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/","name":"Business Email Compromise (BEC) Attacks - CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/#primaryimage"},"image":{"@id":"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/05\/iStock-944060494-scaled.jpg","datePublished":"2024-01-22T09:18:44+00:00","dateModified":"2026-05-04T12:52:55+00:00","description":"Business Email Compromise (BEC) is a devious and sophisticated scam that targets businesses and individuals who execute transfers of funds.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/#primaryimage","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/05\/iStock-944060494-scaled.jpg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/05\/iStock-944060494-scaled.jpg","width":2560,"height":1596,"caption":"Shot of two businessmen having a discussion in an office"},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/fr\/business-email-compromise-bec-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cwsisecurity.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Business Email Compromise (BEC) Attacks"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/fr\/#website","url":"https:\/\/cwsisecurity.com\/fr\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/fr\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cwsisecurity.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/fr\/#\/schema\/person\/870becf0b1e6869361f9510f90f8ce2a","name":"fluroltd","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","caption":"fluroltd"},"sameAs":["https:\/\/cwsisecurity.com"]}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/posts\/2547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/comments?post=2547"}],"version-history":[{"count":1,"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/posts\/2547\/revisions"}],"predecessor-version":[{"id":8793,"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/posts\/2547\/revisions\/8793"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/media\/8588"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/media?parent=2547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/categories?post=2547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/tags?post=2547"},{"taxonomy":"sector","embeddable":true,"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/sector?post=2547"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/solution?post=2547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}