← Back to Blog
SEPTEMBER 11, 2024

Email Security After BEC: What Still Works

Author: Aaron Smith

Business email compromise is still one of the highest-return attack paths in enterprise environments.

Attackers do not need advanced malware to create impact.

They need trust, timing, and a believable pretext.

As defensive tooling has improved, BEC tactics have shifted: more account takeover attempts, better social engineering, abuse of legitimate cloud email features, and patient multi-step fraud workflows.

The frustrating part is familiar: many organizations have invested heavily in secure email gateways, anti-phishing training, and identity controls, yet high-risk incidents still occur.

The explanation is not that controls are useless.

It is that controls work best as a system, and many programs deploy them as isolated layers without governance alignment.

Email security after BEC is less about finding one new magic control and more about executing a disciplined combination of identity hardening, detection tuning, financial process controls, and continuous user conditioning.

Why BEC remains resilient BEC attacks remain effective because they target business process, not just technical vulnerabilities.

An attacker who gains access to one trusted mailbox can influence payment approvals, redirect invoice flows, request credential resets, or trigger data disclosure.

Even when messages are technically clean, intent is malicious.

Modern BEC campaigns exploit several realities:

  • Email is still a primary workflow channel for approvals and vendor communication
  • Identity compromise often bypasses traditional content-based phishing detection
  • Hybrid work increases asynchronous communication and reduces verbal verification
  • Operational teams are optimized for speed, which creates social pressure to comply As a result, BEC defense must include governance decisions about how the organization authorizes sensitive actions, not just how it filters inbound mail.
  • Control stack fundamentals that still matter Despite evolving tactics, core controls continue to provide measurable value when implemented correctly and monitored consistently.

    1) Domain authentication and anti-spoofing SPF, DKIM, and DMARC are still foundational.

    They reduce spoofing abuse against your domains and improve trust signals for downstream filtering.

    The key is operational maturity, not box-checking:

  • Maintain accurate SPF records within lookup limits
  • Rotate DKIM keys on schedule and after key exposure events
  • Move DMARC from monitor to quarantine/reject where feasible
  • Monitor alignment failures and third-party sender drift Organizations often stop at initial configuration and miss policy decay.
  • Periodic validation should be part of governance cadence.

    2) Strong identity controls for mailbox access BEC increasingly begins with credential theft, token theft, or session hijacking rather than obvious phishing payloads.

    Strong identity posture is non-negotiable:

  • Phishing-resistant MFA for high-risk roles
  • Conditional access policies based on device, location, and risk
  • Legacy authentication protocol disablement
  • Session risk monitoring and token revocation workflows
  • Privileged mailbox protection with stronger controls Identity governance is central here.
  • If high-impact accounts lack elevated safeguards, email security tools will be forced to compensate for preventable access weaknesses.

    3) Mailbox behavior detection Compromised accounts often behave differently before obvious fraud attempts occur.

    Useful detections include:

  • Impossible travel combined with mailbox rule changes
  • Forwarding rule creation to external addresses
  • Sudden deletion or archival of sent items
  • Burst login failures followed by successful access
  • High-volume external messaging from atypical users These detections should trigger response playbooks with clear owner roles and rapid containment options.
  • 4) Process-based fraud controls Technical controls alone cannot fully prevent financially motivated BEC.

    Process controls close critical gaps:

  • Out-of-band verification for banking detail changes
  • Dual approval for high-value transfers
  • Mandatory callback verification to known numbers
  • Segregation of duties for invoice setup and payment release
  • Change hold periods for vendor payment instruction updates When these controls are enforced, many BEC attempts fail even after mailbox compromise.
  • Detection strategy: focus on signal chains Single alerts rarely tell the full story.

    Effective BEC detection correlates identity, mailbox, and process signals into risk chains.

    For example:

    1.

    Suspicious sign-in from new geography

    2.

    Creation of hidden forwarding rule

    3.

    Executive impersonation language in outbound messages

    4.

    Request to update vendor payment instructions Each signal alone may be ambiguous.

    Together they indicate urgent risk.

    Build detection content that reflects attacker workflow stages rather than isolated event types.

    Detection engineering teams should partner with finance operations and IT identity teams to ensure analytic logic maps to real business processes.

    This is where many programs fail: detections are technically sophisticated but operationally disconnected.

    Response playbooks must be explicit and rehearsed BEC response windows are short.

    If your team debates ownership during an incident, losses increase.

    Build and rehearse playbooks for common scenarios:

  • Suspected mailbox compromise with active external communication
  • Executive impersonation targeting finance or HR
  • Vendor payment diversion attempt
  • Internal data exfiltration via email forwarding Each playbook should define:
  • Decision authority for mailbox lock/revoke actions
  • Communications path to impacted business units
  • Legal/compliance notification thresholds
  • Financial institution contact procedures for wire recalls
  • Evidence preservation steps for investigation Run tabletop exercises quarterly with security, IT, finance, legal, and executive assistants.
  • Cross-functional rehearsal is often the difference between contained events and expensive escalations.

    User awareness: precision over volume Generic anti-phishing training has diminishing returns.

    Users tune out repetitive content that does not reflect their risk context.

    A better model uses role-specific scenarios and just-in-time reinforcement.

    Examples:

  • Finance teams: invoice manipulation, urgent payment pressure cues
  • HR teams: payroll update fraud and sensitive document requests
  • Executive support staff: impersonation and calendar-linked pretexting
  • Procurement teams: vendor onboarding and bank detail validation Measure outcomes beyond completion rates.
  • Track reporting speed, high-fidelity reporting quality, and policy adherence during simulation and real events.

    Common BEC weaknesses that persist Across incident reviews, several weaknesses recur:

  • Incomplete MFA coverage for high-impact accounts
  • Overly permissive mailbox forwarding and external sharing settings
  • Weak governance over vendor master data changes
  • No enforced callback verification for payment changes
  • Alert fatigue with unclear escalation ownership These are governance and execution issues as much as technical issues.
  • Controls exist, but accountability and review cadence are inconsistent.

    Metrics that reflect resilience Move beyond counting blocked phishing messages.

    Better resilience metrics include:

  • Time to detect and contain mailbox compromise
  • Percentage of high-risk accounts under phishing-resistant MFA
  • Number of unauthorized forwarding rule events caught pre-impact
  • Verification compliance rate for payment instruction changes
  • Incident recurrence by root-cause category These metrics connect controls to business outcomes and expose where process failures undermine technical investment.
  • Architecture and policy continuity Email security posture drifts when decisions are undocumented.

    Why is external forwarding enabled for one business unit?

    Why are certain authentication exceptions still active?

    Why do some payment workflows bypass dual approval?

    Without decision records and review dates, temporary exceptions persist.

    Use lightweight architecture decision records for high-impact email and identity policy choices.

    Include owner, rationale, expiry or review trigger, and linked compensating controls.

    This continuity model aligns with broader governance improvements and reduces policy fragmentation over time.

    A practical 90-day hardening plan For teams that want immediate progress, sequence improvements in focused phases.

    Days 1–30:
  • Validate SPF/DKIM/DMARC posture and close major gaps
  • Identify high-risk accounts and enforce stronger MFA policies
  • Audit mailbox forwarding and suspicious rule baselines
  • Document current payment change verification process
  • Days 31–60:
  • Deploy or tune correlated BEC detections across identity + mailbox telemetry
  • Implement mandatory out-of-band verification for vendor bank changes
  • Finalize incident playbooks with named decision owners
  • Launch role-targeted awareness micro-training
  • Days 61–90:
  • Run cross-functional tabletop exercise for BEC scenarios
  • Measure detection-to-containment time and process compliance
  • Review policy exceptions and close stale approvals
  • Publish executive summary tying controls to reduced fraud exposure This approach balances technical hardening and operational discipline.
  • What still works, and why The controls that still work after years of BEC evolution are not flashy.

    They are consistent identity hardening, reliable anti-spoofing, high-quality behavioral detections, strict financial verification process controls, and practiced cross-team response.

    The unifying factor is governance.

    Controls fail when ownership is vague, exceptions are indefinite, and review cadence is absent.

    Controls succeed when decision rights are explicit, accountability is named, and performance is measured against real business risk.

    If your

    Want to Learn More?

    For detailed implementation guides and expert consultation on cybersecurity frameworks, contact our team.

    Schedule Consultation →