{"id":55104,"date":"2024-01-18T00:00:00","date_gmt":"2024-01-18T00:00:00","guid":{"rendered":"urn:uuid:f7e41e55-e1c3-9dac-be4f-1722c5fa75e0"},"modified":"2024-01-18T00:00:00","modified_gmt":"2024-01-18T00:00:00","slug":"reduce-business-email-compromise-with-collaboration","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/","title":{"rendered":"Reduce Business Email Compromise with Collaboration"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/bec-security-enhancements:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/24\/bec-security-enhancements.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The technology landscape moves fast \u2013 but some things remain remarkably unchanged. Despite the emergence of alternative platforms, email is still a primary communications channel for internal and external business use worldwide. <a href=\"https:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2023\/04\/Email-Statistics-Report-2023-2027-Executive-Summary.pdf\" target=\"_blank\" rel=\"noopener\">An estimated<\/a> 347 billion daily messages were sent and received last year, with the figure set to grow 4% in 2024. The enduring popularity of email also ensures it remains one of the top attack vectors for threat actors. Over two-fifths (43%) of the 146.4 billion threats <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/24\/a\/bec-security-enhancements\/rpt-rethinking-tactics-annual-cybersecurity-roundup-2022.pdf\" title=\"Rethinking Tactics: 2022 Annual Cybersecurity Report\"><span class=\"bs-modal\">Trend blocked<\/span><\/a> in 2022 were email-borne.<\/p>\n<p>As organizations continue to expand and diversify their use of communication tools, so does the corporate attack surface. The growing need for email security that integrates with other collaboration tools is the new reality that <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/email-and-collaboration.html\">Trend Vision One\u2122 Email and Collaboration Security<\/a><b> <\/b>was built for.<\/p>\n<p><span class=\"body-subhead-title\"><span>Security is getting harder<\/span><\/span><\/p>\n<p>Communication and collaboration tools offer threat actors a significant advantage. It\u2019s a relatively straightforward, low-cost way to reach users: arguably the weakest point in a corporate cybersecurity environment. That explains the gusto with which they continue to launch attacks\u2014from opportunistic \u201cspray-and-pray\u201d campaigns to more targeted efforts which may require prior social media research on targets. The advent of generative AI (GenAI) has supercharged these attacks. Threats include:<\/p>\n<p><b>Business email compromise (BEC),<\/b> which made cyber-criminals an estimated $2.7bn+ in 2022, <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2022_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\">according to the FBI.<\/a> As the threat carries no malware, it can be harder to detect.<\/p>\n<p><b>Phishing<\/b>, which can be used to steal credentials or trick users into installing malware without their knowledge. Despite increased investment in user training and awareness raising, social engineering remains difficult to effectively \u201cpatch.\u201d<\/p>\n<p><b>Ransomware<\/b>, which continues to cause global organizations significant reputational and financial damage. It may begin with a malicious email-borne payload or credential theft attempt. In the US alone, <a href=\"https:\/\/www.emsisoft.com\/en\/blog\/44987\/the-state-of-ransomware-in-the-u-s-report-and-statistics-2023\/\" target=\"_blank\" rel=\"noopener\">2,207 hospitals<\/a>, schools and governments were directly impacted by ransomware over the 2023, with thousands more private businesses suffering.<\/p>\n<p><b>Zero-day threats. <\/b>As of September 2023, the <a href=\"https:\/\/www.infosecurity-magazine.com\/news-features\/guide-zero-day-vulnerabilities\/#:~:text=Of%20the%2069%20zero%2Ddays,days%20exploited%20in%20the%20wild.\" target=\"_blank\" rel=\"noopener\">year was on track<\/a> to record the biggest ever annual number of previously unseen vulnerabilities.<\/p>\n<p>At the same time, the collaboration environment has expanded to include cloud storage and file-sharing tools, and cloud-based productivity platforms. Yet many existing products don\u2019t have a solution that works across both email and collaboration environments. Oftentimes, built-in security tools are limited in their protection scope. <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/research-and-analysis\/threat-reports\/roundup\/annual-trend-micro-email-threats-report\">Trend Micro has intercepted<\/a> millions of malicious emails for customers over recent years that platforms like Microsoft 365 failed to stop.<\/p>\n<p>Stretched IT teams are also struggling with a surplus of security point products across email and other environments, both in the cloud and on-premises. These add management overheads and extra cost in the form of unnecessary licenses and create security gaps \u2013 especially when attacks blend email, network, cloud, endpoint and other threat vectors. These silos also perpetuate barriers between specialist IT teams. In an increasingly dynamic and fluid landscape where the bad guys hold much of the advantage, a singular approach is needed.<\/p>\n<h2><span class=\"body-subhead-title\"><span>One vision for email security and beyond<\/span><\/span><\/h2>\n<p>This is where the Trend Vision One platform comes in. It offers a single version of the truth for IT and security teams to unite around. In practice, this means comprehensive threat protection, detection and response across on-premises and cloud environments. It enables stretched internal teams to continuously manage risk across the entire digital attack surface: including email, users, endpoint, cloud, and network.<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/email-and-collaboration.html\">Trend Vision One\u2122 Email and Collaboration Security<\/a> is the latest piece of the puzzle. Seamlessly and fully integrated with the Trend Vision One platform, it unifies email and collaboration security across any email infrastructure. With centralized visibility and management, IT and security teams can continuously monitor an ever-changing attack surface, understand and prioritize risky users, detect suspicious behavior and threats and take rapid action for containment and recovery.<\/p>\n<p>With this purpose-built solution, users can:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Prevent phishing, ransomware, BEC and other threats more effectively via AI and sandbox malware analysis<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Drive business agility by enabling secure use of a range of collaboration and email tools including Microsoft 365, Google Workspace, on-premises tools, and cloud file sharing and messaging<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Proactively contain threats and disrupt attacks with Attack Surface Risk Management that continuously analyzes employee risk levels in real-time with email user risk assessments<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Eliminate blind spots and enhance detection and response across the entire attack surface using endpoint, network, cloud and third-party intelligence<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Meet and exceed compliance with 200+ pre-built, customizable compliance templates for Microsoft\u00ae OneDrive\u00ae for Business, Microsoft\u00ae SharePoint\u00ae Online, Microsoft\u00ae Teams, Dropbox\u2122, Box\u2122 and Google Drive<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/email-and-collaboration.html\">Trend Vision One\u2122 Email and Collaboration Security<\/a> is also available via the AWS Marketplace for seamless purchasing, deployment and integration with AWS environments. Email threats are here for the long run. It may be time to take a more strategic look at how to manage the resulting cyber risk.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/a\/bec-security-enhancements.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here&#8217;s the latest Trend Vision One\u2122 platform integration addressing the growing need for collaboration in business email security space. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55105,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9520,9511,9508,9534,9523,9577,9539],"class_list":["post-55104","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cloud","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-endpoints","tag-trend-micro-research-latest-news","tag-trend-micro-research-network","tag-trend-micro-research-phishing","tag-trend-micro-research-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Reduce Business Email Compromise with Collaboration 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Reduce Business Email Compromise with Collaboration 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-18T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/bec-security-enhancements:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/reduce-business-email-compromise-with-collaboration\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/reduce-business-email-compromise-with-collaboration\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Reduce Business Email Compromise with Collaboration\",\"datePublished\":\"2024-01-18T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/reduce-business-email-compromise-with-collaboration\\\/\"},\"wordCount\":784,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/reduce-business-email-compromise-with-collaboration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/reduce-business-email-compromise-with-collaboration.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cloud\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Latest News\",\"Trend Micro Research : Network\",\"Trend Micro Research : Phishing\",\"Trend Micro Research : Ransomware\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/reduce-business-email-compromise-with-collaboration\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/reduce-business-email-compromise-with-collaboration\\\/\",\"name\":\"Reduce Business Email Compromise with Collaboration 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/reduce-business-email-compromise-with-collaboration\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/reduce-business-email-compromise-with-collaboration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/reduce-business-email-compromise-with-collaboration.jpg\",\"datePublished\":\"2024-01-18T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/reduce-business-email-compromise-with-collaboration\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/reduce-business-email-compromise-with-collaboration\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/reduce-business-email-compromise-with-collaboration\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/reduce-business-email-compromise-with-collaboration.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/reduce-business-email-compromise-with-collaboration.jpg\",\"width\":976,\"height\":651},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/reduce-business-email-compromise-with-collaboration\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Reduce Business Email Compromise with Collaboration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Reduce Business Email Compromise with Collaboration 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/","og_locale":"en_US","og_type":"article","og_title":"Reduce Business Email Compromise with Collaboration 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-01-18T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/bec-security-enhancements:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Reduce Business Email Compromise with Collaboration","datePublished":"2024-01-18T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/"},"wordCount":784,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/reduce-business-email-compromise-with-collaboration.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cloud","Trend Micro Research : Cyber Threats","Trend Micro Research : Endpoints","Trend Micro Research : Latest News","Trend Micro Research : Network","Trend Micro Research : Phishing","Trend Micro Research : Ransomware"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/","url":"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/","name":"Reduce Business Email Compromise with Collaboration 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/reduce-business-email-compromise-with-collaboration.jpg","datePublished":"2024-01-18T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/reduce-business-email-compromise-with-collaboration.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/reduce-business-email-compromise-with-collaboration.jpg","width":976,"height":651},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/reduce-business-email-compromise-with-collaboration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Reduce Business Email Compromise with Collaboration"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55104"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55104\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55105"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}