Businessman holding email A BECattack involves attackers sending emails disguised as coming fromhigh-level executives within a company, such as the CEO, to lowerlevel personnel. (Image: Shutterstock)

The most likely cyber attack a company will face willcome in the form of an email. One of the most common forms of emailattack is the business email compromise (BEC), and the mostpopular time of the year for the W-2 version of BEC is right now —tax season.

A BEC attack involves attackers sending emails disguised ascoming from high-level executives within a company, such as theCEO, to lower level personnel. During tax season, the spoof email will often requestthat W-2s for employees be provided by return email.

Complete your profile to continue reading and get FREE access to BenefitsPRO, part of your ALM digital membership.

  • Critical BenefitsPRO information including cutting edge post-reform success strategies, access to educational webcasts and videos, resources from industry leaders, and informative Newsletters.
  • Exclusive discounts on ALM, BenefitsPRO magazine and BenefitsPRO.com events
  • Access to other award-winning ALM websites including ThinkAdvisor.com and Law.com
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.