{"id":3571,"date":"2025-04-01T07:41:22","date_gmt":"2025-04-01T05:41:22","guid":{"rendered":"https:\/\/enthec.com\/?p=3571"},"modified":"2025-04-01T07:53:29","modified_gmt":"2025-04-01T05:53:29","slug":"factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/","title":{"rendered":"Factors that facilitate BEC attacks on senior managers and solutions to mitigate them"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Businesses are increasingly exposed to sophisticated cyberattacks that seek to exploit their vulnerabilities. <\/span><b>BEC (Business Email Compromise) <\/b> <span style=\"font-weight: 400;\">attacks have become one of the biggest threats to organizations of all sizes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The main format of this type of fraud is<\/span> <a href=\"https:\/\/enthec.com\/en\/social-engineering-attacks-on-senior-executives\/\"><span style=\"font-weight: 400;\">social engineering<\/span><\/a>: <span style=\"font-weight: 400;\">cybercriminals<\/span> <b>impersonate a senior manager to deceive employees and suppliers,<\/b> <span style=\"font-weight: 400;\">achieving fraudulent money transfers or the theft of critical information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The problem is that these attacks depend not on technical vulnerabilities but<\/span> <b>human errors and insecure processes.<\/b><span style=\"font-weight: 400;\">The risk is multiplied if senior executives are targeted: their access to privileged information and decision-making capacity make them perfect targets. <\/span><\/p>\n<p><b>How can companies protect themselves?<\/b><span style=\"font-weight: 400;\"> The answer lies in continuous management of exposure to threats. This is where solutions such as <\/span><a href=\"https:\/\/enthec.com\/en\/kartos\/\"><span style=\"font-weight: 400;\">Kartos <\/span><\/a><span style=\"font-weight: 400;\">by Enthec come into play: a cyber-surveillance tool that allows companies to identify risks before they become serious incidents. But before discussing solutions, let&#8217;s look at <\/span><b>why BEC-type attacks are so successful among senior managers.<\/b><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Why are senior managers the preferred target in BEC attacks?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Cybercriminals seek to maximize their profitability with as little effort as possible. Senior managers offer the <\/span><b>perfect combination of authority, access to sensitive data, and a high volume of financial communications.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Here are some key reasons why BEC-type attacks are so successful in this profile:<\/span><\/p>\n<h3><b>1. High level of trust in your communications<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Managers are used to having great responsibility and often must make<\/span> <b>quick decisions.<\/b><span style=\"font-weight: 400;\">For this reason, they may not question every email they receive, especially if it comes from a regular contact. Attackers use this trust to sneak into the daily routine without raising suspicion. <\/span><\/p>\n<h3><b>2. Frequent use of personal devices<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Many executives use their mobile phones or tablets to access corporate email without the same security measures as on a company computer. This <\/span><b>facilitates unauthorized access and spoofing.<\/b><\/p>\n<h3><b>3. High workload and urgency in decisions<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Senior managers are often overloaded with tasks and under pressure to respond quickly. Cybercriminals use tactics such as a <\/span><b>&#8220;sense of urgency&#8221;<\/b> <span style=\"font-weight: 400;\">to get users to act without verifying the authenticity of an email or payment request.<\/span><\/p>\n<h3><b>4. Public profiles on the internet and social networks<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Information about a CEO or CFO is usually available online: interviews, LinkedIn posts, events in which they participate, etc. This helps attackers<\/span> <b>build extremely credible fake emails,<\/b> <span style=\"font-weight: 400;\">using language and tone similar to the manager&#8217;s.<\/span><\/p>\n<h3><b>5. Lack of specific cybersecurity training<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Unlike other employees, executives rarely receive ongoing training in <\/span> <a href=\"https:\/\/enthec.com\/en\/keys-to-digital-security-in-companies\/\"><span style=\"font-weight: 400;\">digital security.<\/span><\/a><span style=\"font-weight: 400;\">Their position in the company often results in them <\/span><b>being excluded from these processes, making them a weak link in the security chain.<\/b><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-3558 aligncenter\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/ataques-bec.jpg\" alt=\"BEC attacks\" width=\"600\" height=\"410\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/ataques-bec.jpg 600w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/ataques-bec-300x205.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/ataques-bec-350x239.jpg 350w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><b>How to Mitigate BEC Attacks on Senior Managers<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Prevention is the key to avoiding falling for a BEC attack. Companies must combine <\/span><b>awareness, technology, and security protocols <\/b> <span style=\"font-weight: 400;\">to reduce exposure to these threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some fundamental measures:<\/span><\/p>\n<h3><b>1. Implement a Continuous Threat Exposure Management (CTEM) solution<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">CTEM tools allow real-time analysis of threats targeting the company and its managers. For example, at <\/span><b>Kartos<\/b>, <span style=\"font-weight: 400;\">we constantly monitor the company&#8217;s level of exposure, detecting impersonation attempts or data leaks that could facilitate a BEC attack.<\/span><\/p>\n<h3><b>2. Strict verification of sensitive transactions<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Businesses must establish<\/span> <b>two-factor authentication<\/b><span style=\"font-weight: 400;\"> to authorize payments or changes to bank accounts. An email is not enough; It must be confirmed by phone or through a secure system. <\/span><\/p>\n<h3><b>3. Protecting the digital identity of senior managers<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">It is crucial to minimize public information about them on the internet and social networks and to locate sensitive personal information that may be exposed. In addition, they must use corporate email addresses with <\/span><b>authentication protocols such as DMARC, SPF, and DKIM <\/b> <span style=\"font-weight: 400;\">to prevent spoofing.<\/span><\/p>\n<h3><b>4. Continuous training and attack simulations<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Managers should participate in<\/span> <b>phishing simulations<\/b><span style=\"font-weight: 400;\"> and receive specific cybersecurity training. This will help them identify fraudulent emails and react appropriately to attack attempts. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">You may be interested in\u2192<\/span> <a href=\"https:\/\/enthec.com\/en\/phishing-what-is-it-and-how-many-types-are-there\/\"><span style=\"font-weight: 400;\">Phishing: what it is and how many types there are<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>5. Using Artificial Intelligence to Detect Anomalies<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Advanced security systems can<\/span> <b>identify suspicious communication patterns<\/b> <span style=\"font-weight: 400;\">and block phishing emails before they reach the user&#8217;s inbox. <\/span> <span style=\"font-weight: 400;\">They also identify online identity theft campaigns, as <strong>Kartos AI <\/strong> does, to monitor them until they are deactivated.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Protect your company with Kartos<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">BEC attacks continue to grow in number and sophistication, but the solution is not only strengthening technical security but also <\/span><b>proactively managing threat exposure. <\/b><\/p>\n<p><span style=\"font-weight: 400;\">With <\/span><b>Kartos<\/b><span style=\"font-weight: 400;\">, companies can monitor their presence on the network in real time and detect warning signs before attackers manage to impersonate a senior manager. This <\/span><b>cyber surveillance and continuous threat management platform<\/b> <span style=\"font-weight: 400;\">allows fraud to be prevented, sensitive data to be protected, and the risks arising from digital exposure to be minimised.<\/span><\/p>\n<p><b>Want to learn more about protecting your business from BEC attacks?<\/b> <a href=\"https:\/\/enthec.com\/en\/contact\/\"><span style=\"font-weight: 400;\">Find out how Kartos can help<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Businesses are increasingly exposed to sophisticated cyberattacks that seek to exploit their vulnerabilities. BEC (Business Email Compromise) attacks have become [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3561,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[32,33,38,52],"class_list":["post-3571","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-kartos-en","tag-risks","tag-organizations","tag-phishing-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Title: \u25b7 BEC Attacks: How to Prevent Them | Enthec<\/title>\n<meta name=\"description\" content=\"Description: BEC attacks target senior managers to steal money and information \u27a1\ufe0f Find out how to protect your company with Kartos!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Title: \u25b7 BEC Attacks: How to Prevent Them | Enthec\" \/>\n<meta property=\"og:description\" content=\"Description: BEC attacks target senior managers to steal money and information \u27a1\ufe0f Find out how to protect your company with Kartos!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-01T05:41:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-01T05:53:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/ataque-bec-directivos.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"Factors that facilitate BEC attacks on senior managers and solutions to mitigate them\",\"datePublished\":\"2025-04-01T05:41:22+00:00\",\"dateModified\":\"2025-04-01T05:53:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/\"},\"wordCount\":797,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/ataque-bec-directivos.jpg\",\"keywords\":[\"Kartos\",\"Risks\",\"Organizations\",\"phishing\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/\",\"url\":\"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/\",\"name\":\"Title: \u25b7 BEC Attacks: How to Prevent Them | Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/ataque-bec-directivos.jpg\",\"datePublished\":\"2025-04-01T05:41:22+00:00\",\"dateModified\":\"2025-04-01T05:53:29+00:00\",\"description\":\"Description: BEC attacks target senior managers to steal money and information \u27a1\ufe0f Find out how to protect your company with Kartos!\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/ataque-bec-directivos.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/ataque-bec-directivos.jpg\",\"width\":2000,\"height\":1334,\"caption\":\"ataque BEC a directivos\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Factors that facilitate BEC attacks on senior managers and solutions to mitigate them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Title: \u25b7 BEC Attacks: How to Prevent Them | Enthec","description":"Description: BEC attacks target senior managers to steal money and information \u27a1\ufe0f Find out how to protect your company with Kartos!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/","og_locale":"en_US","og_type":"article","og_title":"Title: \u25b7 BEC Attacks: How to Prevent Them | Enthec","og_description":"Description: BEC attacks target senior managers to steal money and information \u27a1\ufe0f Find out how to protect your company with Kartos!","og_url":"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2025-04-01T05:41:22+00:00","article_modified_time":"2025-04-01T05:53:29+00:00","og_image":[{"width":2000,"height":1334,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/ataque-bec-directivos.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"Factors that facilitate BEC attacks on senior managers and solutions to mitigate them","datePublished":"2025-04-01T05:41:22+00:00","dateModified":"2025-04-01T05:53:29+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/"},"wordCount":797,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/ataque-bec-directivos.jpg","keywords":["Kartos","Risks","Organizations","phishing"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/","url":"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/","name":"Title: \u25b7 BEC Attacks: How to Prevent Them | Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/ataque-bec-directivos.jpg","datePublished":"2025-04-01T05:41:22+00:00","dateModified":"2025-04-01T05:53:29+00:00","description":"Description: BEC attacks target senior managers to steal money and information \u27a1\ufe0f Find out how to protect your company with Kartos!","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/ataque-bec-directivos.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/ataque-bec-directivos.jpg","width":2000,"height":1334,"caption":"ataque BEC a directivos"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/factors-that-facilitate-bec-attacks-on-senior-managers-and-solutions-to-mitigate-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Factors that facilitate BEC attacks on senior managers and solutions to mitigate them"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=3571"}],"version-history":[{"count":0,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3571\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/3561"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=3571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=3571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=3571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}