Privacy Ninja



        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

How can businesses protect their enterprise from Business Email Compromise (BEC) attacks?

Business Email Compromise
Protect your enterprise from Business Email Compromise attacks!

Business Email Compromise (BEC) attacks

As reported by Singapore Computer Emergency Response Team (SingCERT), the trend of Business Email Compromise (BEC) attacks has been increasing over the years and there’s a need for enterprises to protect themselves from these attacks by promoting the adoption of good cyber hygiene practices and raising cybersecurity awareness among their employees.

What is BEC?

A Business Email Compromise is an email-based fraud technique utilized by cyber criminals to gain access to confidential business information of an enterprise or extract money by impersonating as a CEO of a company, a business partner, or a known contact of the victim, and fraudulently requests for payment or a wire transfer. 

Through phishing attacks, data from past breaches, and data harvesting from the employee’s social media accounts, the employees’ enterprise email accounts can be compromised. As BEC is executed using a spoofed email account to send such a request, the employee’s emails can be used for such a scam. 

More commonly, the unsuspecting victims would believe that the email they received was a genuine one and proceeds to the transfer request. However, upon finding out that the legitimate receiving end did not receive any payment intended for them, that’s the only time that they find out that they have become a victim of BEC.

As businesses massively adapt to the digital age brought by the COVID-19 pandemic, cybercriminals have a growing opportunity to launch attacks and scam more enterprises. With this, there’s a need for these enterprises to be vigilant and take precautionary measures to avoid becoming an unsuspecting victim.

Also Read: What You Need to Know About Singapore’s Data Sharing Arrangements

BEC is a problem that must be stopped!

A new variant of Business Email Compromise

In 2020, the Singapore Police Force (SPF) had alerted the general public of a new variant of BEC. According to them, since January 2019, at least 90 reports of this variant had resurfaced, incurring a loss of at least S$987,000. 

In this new variant, the unsuspecting victims are instructed to purchase iTunes or Google Play gift cards for various work-related reasons and then are asked to send over the redemption codes.

How can businesses protect their enterprise from Business Email Compromise (BEC) attacks?

SingCERT has laid down the following recommendations that enterprises should adopt to protect themselves from BEC:

For Enterprise Owners

As Business Email Compromise attacks rely heavily on social engineering tactics, enterprise owners are advised to do the following:

Promote a Culture of (Cyber) Vigilance Among Employees

  • Regularly share cyber hygiene tips and news on current scam/phishing cases
  • Conduct regular phishing drills and remind employees to verify the authenticity of emails, especially those that are suspicious or unsolicited

Implement Additional Verification Process for Finance-related Requests

Implement a secondary confirmation* process to verify the authenticity of finance-related requests, including funds transfer, change of supplier or vendor bank account, and invoice payment.

*This secondary confirmation should be via a different medium (i.e. phone call or text message) to prevent direct communications with the criminal, in the event the email account has been compromised.

For Enterprise IT Teams

Enterprises can strengthen their IT infrastructure posture to prevent spoofed emails from reaching their employees by implementing the following:

Block Malicious or Spoofed Emails

If your enterprise is using Microsoft 365, you can:

1.    Enable anti-spoofing protection, anti-phishing policies and email authentication.

2.    Enable anti-malware policies.

3.    Enable the “Report Message” function and encourage employees to report any possible phishing email for investigation.

If your enterprise is not using Microsoft 365,

1.    Implement filters at the email gateway to filter out emails with known malware spamming indicators and block suspicious IP addresses at the firewall.

2.    Use free email authentication tools such as Domain-based Message Authentication, Reporting and Conformance (DMARC) which can help detect spoofed emails.

Implement Strong Password Policies

  • Enforce regular password changes, and require the use of strong passwords

·       Enable multi-factor authentication (MFA) where possible for enhanced security, especially for employees with the authority to authorise payment.

Maintain System Hygiene

  • Ensure that automatic updates are enabled for the antivirus software, and perform a full scan of the machine(s) in your network regularly.
  • Conduct regular audits on user passwords against common password lists by using available resources and tools online.
  • Verify and remove any unauthorised/suspicious/dormant user accounts in the system as these could be leveraged to gain access into the system.
  • Check for and remove any suspicious email forwarding rules.
  • Monitor the authentication logs and investigate multiple unsuccessful login attempts.
The hybrid work scenario has also made remote employees vulnerable to Business Email Compromise attacks.

For Employees

Employees play a key role in thwarting Business Email Compromise attempts.

Inspect suspicious / urgent emails closely

·       Typically, phishing campaigns’ emails will sound urgent and list dire consequences if the recipient does not act promptly. Business Email Compromise-type emails may also ask the recipient to change the designated account for receiving wire payments.

·       Seek confirmation using a different medium (i.e. phone call or text message) before proceeding with an important instruction that was sent via the email. Report any suspicious phishing email to your administrator and do not click on any links or open any attachments from the email.

Also Read: Data Protection Act of Singapore: Validity in the Post-pandemic World

Furthermore, the Singapore Police Force also provided the following preventive measures advisory that enterprises should adopt:

a. Be mindful of any new or sudden changes in payment instructions and bank accounts. Always verify these instructions by calling the e-mail sender. Previously known phone numbers should be used instead of the numbers provided in the fraudulent email. 

b. Educate your employees on this scam, especially those that are responsible for making fund transfers for purposes such as making purchases or managing HR payroll. 

c. Prevent your email account from being hacked by using strong passwords, changing them regularly, and enabling Two-Factor Authentication (2FA) where possible. Consider installing free email authentication tools such as Domain-based Message Authentication, Reporting and Conformance, DMARC (, which can help detect fraudulent emails. 

d. Install anti-virus, anti-spyware/malware, and firewall on your computer, and keep them updated. You may consider installing free Domain Name System (DNS) protection services such as Quad9 ( to protect against such attacks. Lastly, update your Operating System (OS) when new patches are made available.



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us