{"id":1391,"date":"2025-04-15T03:46:01","date_gmt":"2025-04-15T03:46:01","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=1391"},"modified":"2025-04-15T03:46:01","modified_gmt":"2025-04-15T03:46:01","slug":"e-mail-is-nonetheless-the-weakest-hyperlink","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=1391","title":{"rendered":"E mail Is Nonetheless the Weakest Hyperlink"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"generic-article\">\n<p class=\"text-muted\">\n                                            <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/email-security-protection-c-583\" id=\"asset_topic_1_1\">E mail Safety &amp; Safety<\/a><br \/>\n                                                    ,<br \/>\n                                                            <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/fraud-management-cybercrime-c-409\" id=\"asset_topic_1_2\">Fraud Administration &amp; Cybercrime<\/a>\n                                                    <\/p>\n<p>                    <span class=\"article-sub-title\">At-Bay Cyber Insurance coverage Claims Report Finds 83% of Monetary Fraud Begins With E mail<\/span><br \/>\n                <span class=\"article-byline\"><br \/>\n                                                <a rel=\"nofollow\" target=\"_blank\" class=\"author-link\" href=\"https:\/\/www.bankinfosecurity.com\/authors\/suparna-goswami-i-1945\">Suparna Goswami<\/a> (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.twitter.com\/gsuparna\"><i class=\"fa fa-twitter\"\/>gsuparna<\/a>)                                                    \u2022<br \/>\n                        <span class=\"text-nowrap\">April 14, 2025<\/span> \u00a0 \u00a0 <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/fraud-in-your-inbox-email-still-weakest-link-a-27997#disqus_thread\"\/><\/span><\/p>\n<figure>\n                <img decoding=\"async\" src=\"https:\/\/130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com\/fraud-in-your-inbox-email-still-weakest-link-showcase_image-10-a-27997.jpg\" alt=\"Fraud in Your Inbox: Email Is Still the Weakest Link\" class=\"img-responsive \"\/><figcaption>Picture: Shutterstock<\/figcaption><\/figure>\n<p>Monetary fraud stays the main driver of cyberinsurance claims, with 83% of circumstances traced again to email-based assaults. Widespread ways used to deceive workers embrace wiring funds to fraudulent accounts, generative AI-crafted emails, govt and vendor impersonation and enterprise e-mail compromise scams.<\/p>\n<p><b>See Additionally:<\/b> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/webinars\/new-ondemand-qr-codes-exposed-from-convenience-to-cybersecurity-w-6136?rf=RAM_SeeAlso\">New OnDemand | QR Codes Uncovered: From Comfort to Cybersecurity Nightmare<\/a><\/p>\n<p> &#13;<\/p>\n<p> The findings by At-Bay <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.at-bay.com\" target=\"_blank\">replicate<\/a> broader fraud developments. In line with the FBI&#8217;s newest <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2023_IC3Report.pdf\" target=\"_blank\">Web Crime Report<\/a>, losses from BEC scams alone topped $2.9 billion within the U.S. in 2023. Equally, a latest LexisNexis Danger Options report highlights that monetary providers establishments globally skilled a 61% enhance in fraud makes an attempt involving artificial identities and mule accounts. <\/p>\n<p>&#13;<\/p>\n<p> Monetary fraud continues to guide the pack in cyberinsurance claims, with e-mail rising as the first assault vector, particularly for mid-sized companies. The 2025 At-Bay InsurSec Report reveals that monetary fraud made up practically a 3rd of all cyberincidents amongst its insured shoppers in 2024.<\/p>\n<p>&#13;<\/p>\n<p>Whereas e-mail was the start line in 43% of all cyberinsurance claims, it was utilized in simply 6% of ransomware assaults. In distinction, 83% of monetary fraud circumstances started with a fraudulent e-mail. This reveals that whereas e-mail safety instruments are good at blocking malware, they usually miss rip-off emails that trick folks into sending cash. As a substitute of making an attempt to interrupt into computer systems, cybercriminals are actually specializing in fooling folks via rigorously crafted messages, the report stated. <\/p>\n<p>&#13;<\/p>\n<p>&#8220;A BEC rip-off is extra of a human vulnerability than a technological or organizational one,&#8221; stated Mario Demarillas, a member of the board of administrators, CISO and head of IT consulting and software program engineering at Exceture. &#8220;We people are educated from childhood to maturity to belief within the bodily world implicitly. However we don&#8217;t make an sufficient transition in belief from the bodily to the digital atmosphere, so scams akin to BEC thrive within the digital world,&#8221; he stated. <\/p>\n<p> &#13;<\/p>\n<p> Whereas worker safety consciousness coaching is essential &#8211; particularly for finance and HR groups &#8211; implementing multifactor authentication throughout all accounts and utilizing e-mail authentication protocols akin to DMARC, SPF and DKIM is now being made obligatory by cyberinsurance companies. In truth, cyberinsurers are actually scrutinizing shoppers&#8217; e-mail safety posture earlier than underwriting insurance policies, with some denying protection if MFA and BEC simulation coaching are absent, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web.coalitioninc.com\/download-2024-cyber-claimsreport.html\" target=\"_blank\">discovered<\/a> a examine by Coalition&#8217;s Cyber Insurance coverage Claims Report.  <\/p>\n<p>&#13;<\/p>\n<p>Throughout business sectors, monetary and insurance coverage corporations suffered probably the most important common losses from monetary fraud, at over $500,000 per incident. Different extremely impacted sectors embrace development, skilled providers and manufacturing. <\/p>\n<p> &#13;<\/p>\n<p>These fraud developments underscore the vulnerability of a number of components of a company, as attackers more and more exploit routine digital communication for high-stakes monetary acquire. <\/p>\n<p> &#13;<\/p>\n<p>In the meantime, international locations are popping out with authorized responses to BEC scams. Within the U.Okay., the Cost Techniques Regulator&#8217;s new obligatory reimbursement rule goals to curb losses from licensed scams, together with BEC, which accounted for practically \u00a3500 million in losses final 12 months. <\/p>\n<p> &#13;<\/p>\n<p>FS-ISAC additionally has launched a Cyber Fraud Prevention Framework to assist monetary establishments streamline and strengthen their fraud prevention and mitigation efforts by breaking down silos between cyber and fraud groups. The framework encourages establishments to look at the sooner phases of the fraud lifecycle, akin to reconnaissance and preliminary entry, the place behavioral anomalies or social engineering makes an attempt may be detected. <\/p>\n<\/p><\/div>\n<p><template id="aY1UtfuZT2wJJfpx0y5W"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>E mail Safety &amp; Safety , Fraud Administration &amp; Cybercrime At-Bay Cyber Insurance coverage Claims Report Finds 83% of Monetary Fraud Begins With E mail Suparna Goswami (gsuparna) \u2022 April 14, 2025 \u00a0 \u00a0 Picture: Shutterstock Monetary fraud stays the main driver of cyberinsurance claims, with 83% of circumstances traced again to email-based assaults. Widespread [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1393,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[578,1284,1283],"class_list":["post-1391","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-email","tag-link","tag-weakest"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/1391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1391"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/1391\/revisions"}],"predecessor-version":[{"id":1392,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/1391\/revisions\/1392"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/1393"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-14 22:39:04 UTC -->