{"id":98723,"date":"2023-08-17T09:03:17","date_gmt":"2023-08-17T07:03:17","guid":{"rendered":"https:\/\/www.megasoft.de\/?p=98723"},"modified":"2023-08-17T09:03:24","modified_gmt":"2023-08-17T07:03:24","slug":"business-e-mail-compromise","status":"publish","type":"post","link":"https:\/\/www.megasoft.de\/en\/lexikon\/business-e-mail-compromise\/","title":{"rendered":"Business E-Mail Compromise\u00a0"},"content":{"rendered":"<p><strong>Business E-Mail Compromise (BEC): Eine wachsende Bedrohung f\u00fcr Unternehmen<\/strong>&nbsp;<\/p>\n\n\n\n<p>In der modernen Gesch\u00e4ftswelt ist Kommunikation das Herzst\u00fcck der meisten Operationen. Leider bietet dies auch eine Angriffsfl\u00e4che f\u00fcr Betr\u00fcger. Ein zunehmend besorgniserregendes Ph\u00e4nomen ist der Business E-Mail Compromise (BEC), eine spezialisierte Form des Betrugs, die Unternehmen weltweit Milliarden kostet.&nbsp;<\/p>\n\n\n\n<p><strong><em>Was ist Business E-Mail Compromise?<\/em><\/strong>&nbsp;<\/p>\n\n\n\n<p>BEC ist ein Angriff, bei dem ein Betr\u00fcger die Identit\u00e4t eines Unternehmensmitarbeiters oder Gesch\u00e4ftspartners annimmt, oft durch das Hacken oder Spoofing von E-Mail-Konten. Der Angreifer zielt darauf ab, das Opfer zur \u00dcberweisung von Geld oder zur Herausgabe vertraulicher Informationen zu bewegen.&nbsp;<\/p>\n\n\n\n<p><strong><em>Wie funktioniert BEC?<\/em><\/strong>&nbsp;<\/p>\n\n\n\n<p>BEC-Angriffe sind raffiniert und oft schwer zu erkennen. Hier sind die h\u00e4ufigsten Schritte:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li><strong>Zielidentifikation:<\/strong> Der Betr\u00fcger identifiziert ein Ziel, oft eine Person in der Finanzabteilung oder mit Zugang zu sensiblen Informationen.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Informationsbeschaffung:<\/strong> Durch Social Engineering oder andere Techniken sammelt der Betr\u00fcger Informationen \u00fcber das Ziel, das Unternehmen und seine Gesch\u00e4ftsabl\u00e4ufe.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><strong>E-Mail-Spoofing oder Konto\u00fcbernahme:<\/strong> Der Betr\u00fcger erstellt eine gef\u00e4lschte E-Mail-Adresse, die der eines legitimen Gesch\u00e4ftspartners oder Kollegen \u00e4hnelt, oder \u00fcbernimmt das tats\u00e4chliche Konto.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li><strong>T\u00e4uschung:<\/strong> Unter der falschen Identit\u00e4t bittet der Betr\u00fcger das Opfer, Geld zu \u00fcberweisen, Informationen preiszugeben oder eine andere Aktion auszuf\u00fchren, die dem Unternehmen schaden k\u00f6nnte.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\">\n<li><strong>Gewinnung:<\/strong> Wenn das Opfer dem Betr\u00fcger folgt, erlangt dieser Geld oder Informationen, die er f\u00fcr finanziellen Gewinn nutzen kann.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p><strong><em>Wie kann man BEC verhindern?<\/em><\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Mitarbeiterschulung:<\/strong> Mitarbeiter sollten in Bezug auf BEC sensibilisiert und geschult werden, um verd\u00e4chtige Anfragen zu erkennen.&nbsp;<\/li>\n\n\n\n<li><strong>Multi-Faktor-Authentifizierung:<\/strong> Die Verwendung von mehreren Authentifizierungsmethoden kann das Risiko einer Konto\u00fcbernahme verringern.&nbsp;<\/li>\n\n\n\n<li><strong>Richtlinien f\u00fcr \u00dcberweisungen:<\/strong> Klare Protokolle f\u00fcr Finanztransaktionen, einschlie\u00dflich \u00dcberpr\u00fcfungen und Genehmigungen, k\u00f6nnen das Risiko minimieren.&nbsp;<\/li>\n\n\n\n<li><strong>Technische Kontrollen:<\/strong> Spamfilter, E-Mail-Authentifizierung und andere Technologien k\u00f6nnen dazu beitragen, betr\u00fcgerische E-Mails zu erkennen und zu blockieren.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong><em>Fazit<\/em><\/strong>&nbsp;<\/p>\n\n\n\n<p>Business E-Mail Compromise ist eine ernsthafte und wachsende Bedrohung, die jedes Unternehmen treffen kann. Durch eine Kombination aus Aufkl\u00e4rung, klaren Richtlinien und technischen Ma\u00dfnahmen k\u00f6nnen Unternehmen sich jedoch sch\u00fctzen.&nbsp;<\/p>\n\n\n\n<p>In einer Zeit, in der Cyber-Bedrohungen zunehmen, muss die Sicherheit der Unternehmenskommunikation eine Priorit\u00e4t sein. Durch ein besseres Verst\u00e4ndnis von BEC und den darin involvierten Taktiken k\u00f6nnen Unternehmen ihre Verteidigung st\u00e4rken und sicherstellen, dass sie nicht das n\u00e4chste Opfer werden.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">N\u00fctzliche Links:<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/\">Lexikon \u00dcbersicht<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.megasoft.de\/en\/hersteller-portfolio\/\">Auszug Hersteller Portfolio<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Business E-Mail Compromise (BEC): Eine wachsende Bedrohung f\u00fcr Unternehmen&nbsp; In der modernen Gesch\u00e4ftswelt ist Kommunikation das Herzst\u00fcck der meisten Operationen. Leider bietet dies auch eine Angriffsfl\u00e4che f\u00fcr Betr\u00fcger. Ein zunehmend besorgniserregendes Ph\u00e4nomen ist der Business E-Mail Compromise (BEC), eine spezialisierte Form des Betrugs, die Unternehmen weltweit Milliarden kostet.&nbsp; Was ist [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[767,761],"tags":[],"class_list":["post-98723","post","type-post","status-publish","format-standard","hentry","category-b","category-lexikon","wpautop"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Business E-Mail Compromise\u00a0 - megasoft IT GmbH &amp; Co. KG<\/title>\n<meta name=\"description\" content=\"Lexikon: Business E-Mail Compromise erkl\u00e4rt von megasoft IT\u00ae - Your IT Procurement Partner | Software &amp; Beratung seit \u00fcber 35 Jahren!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.megasoft.de\/en\/lexikon\/business-e-mail-compromise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business E-Mail Compromise\u00a0 - megasoft IT GmbH &amp; Co. KG\" \/>\n<meta property=\"og:description\" content=\"Lexikon: Business E-Mail Compromise erkl\u00e4rt von megasoft IT\u00ae - Your IT Procurement Partner | Software &amp; Beratung seit \u00fcber 35 Jahren!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.megasoft.de\/en\/lexikon\/business-e-mail-compromise\/\" \/>\n<meta property=\"og:site_name\" content=\"megasoft IT GmbH &amp; Co. KG\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-17T07:03:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-17T07:03:24+00:00\" \/>\n<meta name=\"author\" content=\"Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/lexikon\\\/business-e-mail-compromise\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/lexikon\\\/business-e-mail-compromise\\\/\"},\"author\":{\"name\":\"Marketing\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#\\\/schema\\\/person\\\/603fa30405f4eaba95ae711730bd7db6\"},\"headline\":\"Business E-Mail Compromise\u00a0\",\"datePublished\":\"2023-08-17T07:03:17+00:00\",\"dateModified\":\"2023-08-17T07:03:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/lexikon\\\/business-e-mail-compromise\\\/\"},\"wordCount\":422,\"publisher\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#organization\"},\"articleSection\":[\"B\",\"Lexikon\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/lexikon\\\/business-e-mail-compromise\\\/\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/lexikon\\\/business-e-mail-compromise\\\/\",\"name\":\"Business E-Mail Compromise\u00a0 - megasoft IT GmbH &amp; Co. KG\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#website\"},\"datePublished\":\"2023-08-17T07:03:17+00:00\",\"dateModified\":\"2023-08-17T07:03:24+00:00\",\"description\":\"Lexikon: Business E-Mail Compromise erkl\u00e4rt von megasoft IT\u00ae - Your IT Procurement Partner | Software & Beratung seit \u00fcber 35 Jahren!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/lexikon\\\/business-e-mail-compromise\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.megasoft.de\\\/lexikon\\\/business-e-mail-compromise\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/lexikon\\\/business-e-mail-compromise\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.megasoft.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business E-Mail Compromise\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#website\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/\",\"name\":\"megasoft IT GmbH &amp; Co. KG\",\"description\":\"Your IT Procurement Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.megasoft.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#organization\",\"name\":\"megasoft IT GmbH &amp; Co. KG\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/megasoft_logo_IT_Procurement_Partner.png\",\"contentUrl\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/megasoft_logo_IT_Procurement_Partner.png\",\"width\":1400,\"height\":350,\"caption\":\"megasoft IT GmbH &amp; Co. KG\"},\"image\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#\\\/schema\\\/person\\\/603fa30405f4eaba95ae711730bd7db6\",\"name\":\"Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b4c1c8e75b65e76157d78c248ef0845f9a19c827a7df87f283cf26d92610998a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b4c1c8e75b65e76157d78c248ef0845f9a19c827a7df87f283cf26d92610998a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b4c1c8e75b65e76157d78c248ef0845f9a19c827a7df87f283cf26d92610998a?s=96&d=mm&r=g\",\"caption\":\"Marketing\"},\"url\":\"https:\\\/\\\/www.megasoft.de\\\/en\\\/author\\\/marketing\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Business E-Mail Compromise\u00a0 - megasoft IT GmbH &amp; Co. KG","description":"Lexikon: Business E-Mail Compromise erkl\u00e4rt von megasoft IT\u00ae - Your IT Procurement Partner | Software & Beratung seit \u00fcber 35 Jahren!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.megasoft.de\/en\/lexikon\/business-e-mail-compromise\/","og_locale":"en_US","og_type":"article","og_title":"Business E-Mail Compromise\u00a0 - megasoft IT GmbH &amp; Co. KG","og_description":"Lexikon: Business E-Mail Compromise erkl\u00e4rt von megasoft IT\u00ae - Your IT Procurement Partner | Software & Beratung seit \u00fcber 35 Jahren!","og_url":"https:\/\/www.megasoft.de\/en\/lexikon\/business-e-mail-compromise\/","og_site_name":"megasoft IT GmbH &amp; Co. KG","article_published_time":"2023-08-17T07:03:17+00:00","article_modified_time":"2023-08-17T07:03:24+00:00","author":"Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Marketing","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.megasoft.de\/lexikon\/business-e-mail-compromise\/#article","isPartOf":{"@id":"https:\/\/www.megasoft.de\/lexikon\/business-e-mail-compromise\/"},"author":{"name":"Marketing","@id":"https:\/\/www.megasoft.de\/#\/schema\/person\/603fa30405f4eaba95ae711730bd7db6"},"headline":"Business E-Mail Compromise\u00a0","datePublished":"2023-08-17T07:03:17+00:00","dateModified":"2023-08-17T07:03:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.megasoft.de\/lexikon\/business-e-mail-compromise\/"},"wordCount":422,"publisher":{"@id":"https:\/\/www.megasoft.de\/#organization"},"articleSection":["B","Lexikon"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.megasoft.de\/lexikon\/business-e-mail-compromise\/","url":"https:\/\/www.megasoft.de\/lexikon\/business-e-mail-compromise\/","name":"Business E-Mail Compromise\u00a0 - megasoft IT GmbH &amp; Co. KG","isPartOf":{"@id":"https:\/\/www.megasoft.de\/#website"},"datePublished":"2023-08-17T07:03:17+00:00","dateModified":"2023-08-17T07:03:24+00:00","description":"Lexikon: Business E-Mail Compromise erkl\u00e4rt von megasoft IT\u00ae - Your IT Procurement Partner | Software & Beratung seit \u00fcber 35 Jahren!","breadcrumb":{"@id":"https:\/\/www.megasoft.de\/lexikon\/business-e-mail-compromise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.megasoft.de\/lexikon\/business-e-mail-compromise\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.megasoft.de\/lexikon\/business-e-mail-compromise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.megasoft.de\/"},{"@type":"ListItem","position":2,"name":"Business E-Mail Compromise\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.megasoft.de\/#website","url":"https:\/\/www.megasoft.de\/","name":"megasoft IT GmbH &amp; Co. KG","description":"Your IT Procurement Partner","publisher":{"@id":"https:\/\/www.megasoft.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.megasoft.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.megasoft.de\/#organization","name":"megasoft IT GmbH &amp; Co. KG","url":"https:\/\/www.megasoft.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.megasoft.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.megasoft.de\/wp-content\/uploads\/megasoft_logo_IT_Procurement_Partner.png","contentUrl":"https:\/\/www.megasoft.de\/wp-content\/uploads\/megasoft_logo_IT_Procurement_Partner.png","width":1400,"height":350,"caption":"megasoft IT GmbH &amp; Co. KG"},"image":{"@id":"https:\/\/www.megasoft.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.megasoft.de\/#\/schema\/person\/603fa30405f4eaba95ae711730bd7db6","name":"Marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b4c1c8e75b65e76157d78c248ef0845f9a19c827a7df87f283cf26d92610998a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b4c1c8e75b65e76157d78c248ef0845f9a19c827a7df87f283cf26d92610998a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4c1c8e75b65e76157d78c248ef0845f9a19c827a7df87f283cf26d92610998a?s=96&d=mm&r=g","caption":"Marketing"},"url":"https:\/\/www.megasoft.de\/en\/author\/marketing\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-07 00:15:21","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/posts\/98723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/comments?post=98723"}],"version-history":[{"count":1,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/posts\/98723\/revisions"}],"predecessor-version":[{"id":98724,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/posts\/98723\/revisions\/98724"}],"wp:attachment":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/media?parent=98723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/categories?post=98723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/tags?post=98723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}