Business Email Compromise (BEC)

INKY’s proprietary machine learning algorithms prevents business email compromise attacks.

What is a BEC Attack?

Business Email Compromise (BEC) is, unfortunately, a thriving and growing scam globally that targets organizations of any size.

According to the FBI, losses from BEC attacks total billions of dollars per year. BEC security is now a necessary responsibility of every IT department. Though examples vary, the general anatomy of the fraud is the same: an attacker identifies key executives or suppliers and impersonates them, convincing an employee to wire funds, sometimes very large amounts of funds. Their methods for brand forgeries and impersonation are sophisticated and fool even savvy employees.

How much can you afford to lose from a BEC attack?

 INKY isn’t adapting to yesterday’s news, she constantly learns and grows. INKYobserves the flow of mail through your organization, and creates behavioral profiles for all of your associates – she knows Bob from accounting better than Bob does.

Other email security solutions typically rely solely on a database of known attackers. INKY uses true machine learning and Computer Vision in addition to up to date databases, to block phishing emails and even catch even zero-day BEC phishing scams.

Over two dozen Computer Vision and text analysis models “see” the message much like a person would. Computer Vision allows INKY to see text-logos and catch text, type, and image anomalies that a human would miss.

What makes INKY different for BEC protection?

INKY detects zero day BEC attacks.

INKY uses computer vision algorithms to recognize brand-indicative design indicators, including fake logos that are convincing, text-only designs but no real logo image. Coupled with sender profiling and anomaly detection algorithms, INKY supplies BEC security against these attacks before they are identified and logged by traditional email protection systems. Traditional email protection systems are working from a known database of attackers and scams.


INKY learns patterns with behavior profiling.

INKY’s true machine learning develops behavior profiles and social graphs that identify suspicious behavior or identities. When INKY sees an email from a sender that doesn’t match a known profile, it sends an impersonation warning.

INKY works with any email clients

No matter whether you’re an Outlook traditionalist, or experimenting with the latest mobile email solutions, INKY integrates into almost any email solution. With just a click, the user can react to the warning banner right in the body of the email. This unique ease of use banner is one of our clients’ favorite features.

Report Phishing Attempts from any device

A unique feature is the ability to click a “Report this Email” link in every email, which means users can report spam, phish, and other problematic email from any device – web, phone, any email client, with no special software.  Most BEC protection software only has the capability to work from an installed instance.

Other Threats

INKY’s state of the art machine learning and AI stops these other threats.

Whaling Attacks

Inky prevents your business from falling victim to costly whaling attacks.

CEO Fraud

INKY blocks CEO fraud attacks known to cause hefty financial losses.

Spear Phishing

INKY take a different approach to spear phishing protection.

Brand Forgery

INKY sees emails like the human does to identify brand forgery attacks

Phishing threats today are increasingly invisible.

According to Verizon’s 2018 Data Breach Investigations Report: 30% of phishing emails get opened by users.

© 2019 Inky Phish Fence For Office 365. Copyright © 2017 Inky Technology Corporation is the creator of Inky® Secure Email