CYBER RISK MANAGEMENT SERVICES

Business Email Compromise (BEC) Readiness Assessment

Protecting your organization against business email compromise starts with ensuring you have the right people, process, and controls in place and tuned to defend against BEC and other email-based attacks.

BENEFITS

Prevent email-based attacks through preparation


Unauthorized access to email leading to financial fraud – or business email compromise (BEC) – is one of the most prevalent forms of cyberattacks today. With a Unit 42™ BEC Readiness Assessment, you prepare for this challenge through a targeted risk assessment that identifies the critical control steps to best defend your organization against this ongoing threat.

SERVICE FEATURES

Knowledge and preparation matter


The Unit 42 Business Email Compromise Assessment is available in three different tiers – each one designed to match the unique needs of your specific organization.

Here’s what we deliver


Unit 42 will evaluate the effectiveness of your technical security controls and operational capabilities in responding to and recovering from a Business Email Compromise incident.

SECURITY CONFIGURATION ASSESSMENT
SECURITY CONFIGURATION ASSESSMENT

SECURITY CONFIGURATION ASSESSMENT

BEC IR TABLETOP EXERCISE
BEC IR TABLETOP EXERCISE

BEC IR TABLETOP EXERCISE

250 CREDITS RESERVED FOR INCIDENT RESPONSE
250 CREDITS RESERVED FOR INCIDENT RESPONSE

250 CREDITS RESERVED FOR INCIDENT RESPONSE

EMAIL COMPROMISE ASSESSMENT
EMAIL COMPROMISE ASSESSMENT

EMAIL COMPROMISE ASSESSMENT

EMAIL ATTACK READINESS BENCHMARK
EMAIL ATTACK READINESS BENCHMARK

EMAIL ATTACK READINESS BENCHMARK

TAILORED BEC IR PLAYBOOK
TAILORED BEC IR PLAYBOOK

TAILORED BEC IR PLAYBOOK

EMAIL ATTACK PURPLE TEAM EXERCISE
EMAIL ATTACK PURPLE TEAM EXERCISE

EMAIL ATTACK PURPLE TEAM EXERCISE

CYBER AWARENESS TRAINING ENHANCEMENT
CYBER AWARENESS TRAINING ENHANCEMENT

CYBER AWARENESS TRAINING ENHANCEMENT

METHODOLOGY

A proven approach to improving BEC readiness

PLAN
Gather Organizational Context

Gather Organizational Context

We will provide a pre-engagement questionnaire to gain an understanding of organizational processes, tools and capabilities.

ASSESS
Review Documentation

Review Documentation

We will review your documentation to identify gaps in email security control design which could contribute to BEC susceptibility.

ASSESS
Conduct Stakeholder Interviews

Conduct Stakeholder Interviews

We will interview key stakeholders to gain additional insight regarding email security controls and technical capabilities.

TEST
Design and Deliver Tabletop Exercises

Design and Deliver Tabletop Exercises

WHY UNIT 42

World-renowned security experts, always in your corner


As an industry-leading threat intelligence, cyber risk management and incident response organization, it's our job to help you prepare and respond to some of the most challenging threats so that your team can get back to business faster. As threats escalate, we act as your trusted partner to advise and strengthen your security strategies.

Related resources

BLOG

Operation Delilah: Unit 42 Helps INTERPOL Identify Nigerian BEC Actor

CASE STUDY

Accelerating Security in a Fact-Paced Industry

DATASHEET

Unit 42 Retainer

jeffries-logo

Go from reactive to proactive

Our consultants serve as your trusted advisors to assess and test your security controls against the right threats, transform your security strategy with an intelligence-informed approach and respond to incidents in record time.
Please complete reCAPTCHA to enable form submission.
By submitting this form, you agree to our Terms. View our Privacy Statement.