• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Icon Systems

Simple to use. Power to grow.

  • (800) 596-4266
  • Free Trial
  • Blog
  • Features
  • Bookkeeping
  • Order
  • Pricing
  • Resources
  • Login

May 20, 2019 by Robert 1 Comment

This post was last updated on March 25th, 2021 at 03:23 pm.

BEC Attacks - Cyber Crime
Cyber Crime | Pixabay

BEC attacks are one of the fastest growing cyber crimes and have cost some organizations millions of dollars. So, it’s important that staff at your church know how these attacks work and how they can be prevented.

What is a BEC attack?

The BEC stands for Business Email Compromise. In this type of cyber attack, a cyber criminal gets a foothold in an organization’s email system (using spoofing, phishing, and so on). The hacker uses that advantage to impersonate personnel from the organization or outside vendors or charities associated with the organization. Then the hacker can convince staff to send sensitive information or wire money to fraudulent bank accounts.

BEC attacks are a growing threat

WestStar Bank, in a blog post about BEC attacks, details the alarming growth rate of BEC attacks:

According to the FBI’s Internet Crime Complaint Center (IC3), Business Email Compromise (BEC) schemes have grown at a jaw-dropping rate of 2,370% since 2015. With more than 40,000 domestic and international incidents, these types of scams have cost more than a staggering $5.3 billion in actual and attempted losses. To help you keep one step ahead of this multi-billion-dollar threat, we put together a quick walkthrough of what a business email compromise is, how it works, and how you can best protect your organization.

BEC Attacks: What They Are and How to Protect Yourself

These trends make sense. Online services and transactions have come to rely a great deal on email accounts for security. Think of all the services where you use your email address as a username, have a password reset sent to your email, or use your email to register a device for a service. Thus, email is where cyber criminals are turning their attention to find weaknesses in your security. A cyber thief wants to get control of your email. Once the thief has it, it opens a world of opportunities to steal from you.

BleepingComputer.com tells the poignant story of how Saint Ambrose Catholic Parish got ripped off for nearly $2 million through a BEC hacking scheme: “$1.75 Million Stolen by Crooks in Church BEC Attack“. For months, the parish thought they were sending payments to their building contractor but were actually sending them to a crook.

Fortunately, the parish database was saved to a secure, cloud-based church management software and was not compromised. “[The cloud based system] allows for many layers of security/protection of our parish database information.” If you’re not currently using a cloud-based church management system for your church’s security, learn more about our IconCMO Church Management Software.

How can you prevent BEC attacks from damaging your church?

WestStar Bank, in the post on BEC attacks mentioned earlier, lists some ways organizations can protect themselves. While some of their tips apply better to large businesses, some of them could be very useful for churches as well.

The main takeaways I’ve found from this and other sources are

  1. Be very careful about the emails you open and respond to, and
  2. Always verify important requests or transactions face-to-face or over the phone when possible.

Filed Under: Did You Know? Tagged With: church management software, cloud computing, non-profit, online security

Reader Interactions

Comments

  1. Avatar for IconSystems.IconSystems says

    May 20, 2019 at 2:52 pm

    I got an email from a client that nearly fell for one of these traps. She found out the truth when she called to verify with the person the hacker was impersonating. So there’s a great example of how to defend against this sort of thing.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

BEC Attacks - Cyber Crime
Top Rated
Church Accounting Software

Search blog posts…

Popular Posts

  • Debits and Credits – Does Debit Mean Minus and Credit Mean Plus?
  • Church Software Mobile Apps - IconCMO Set Up
  • Church Finance - Renting Space And Its Cost
  • Fund Transfers and Account Transfers, part 1 of 2
  • Fund Transfers and Account Transfers, part 2 of 2
  • Icon Systems Announces New Hires and Expansion
  • Bolster Your Outreach With QR Codes
Blog Home

Subscribe to Our Blog!

Sign Up Now
We respect your privacy and you can unsubscribe at any time.
  • The Facebook icon button link
  • The Instagram icon button link
  • The X icon button link
  • The LinkedIn icon button link
  • The YouTube icon button link
  • The Wordpress icon button link
Icon Systems, Inc.
3330 Fiechtner Drive S Suite 204
Fargo, ND 58103
Hours: Mon-Thu 8-5, Fri 8-4 CT
About Us — Privacy — Support — Careers — Sitemap
Recent Blog Posts
  • Is an All-In-One Church Software the Best Option?
  • Church Donation Software - Do you Need It?
  • Text Messaging for Church Software!
  • Is Church Software Online A Better Solution?
  • The Best Church Software Is Compliant & User Friendly!
Sales
800-596-4266
sales@iconcmo.com
Tech Support
218-236-1899
support@iconcmo.com
Fax: 218-236-0235
© 1992 – 2025 Icon Systems, Inc.