Business Email Compromise (BEC)
INKY’s proprietary machine learning algorithms prevents business email compromise attacks.
What is a BEC Attack?
According to the FBI, losses from BEC attacks total billions of dollars per year. BEC security is now a necessary responsibility of every IT department. Though examples vary, the general anatomy of the fraud is the same: an attacker identifies key executives or suppliers and impersonates them, convincing an employee to wire funds, sometimes very large amounts of funds. Their methods for brand forgeries and impersonation are sophisticated and fool even savvy employees.
How much can you afford to lose from a BEC attack?
INKY isn’t adapting to yesterday’s news, she constantly learns and grows. INKYobserves the flow of mail through your organization, and creates behavioral profiles for all of your associates – she knows Bob from accounting better than Bob does.
Other email security solutions typically rely solely on a database of known attackers. INKY uses true machine learning and Computer Vision in addition to up to date databases, to block phishing emails and even catch even zero-day BEC phishing scams.
Over two dozen Computer Vision and text analysis models “see” the message much like a person would. Computer Vision allows INKY to see text-logos and catch text, type, and image anomalies that a human would miss.
What makes INKY different for BEC protection?
INKY detects zero day BEC attacks.
INKY uses computer vision algorithms to recognize brand-indicative design indicators, including fake logos that are convincing, text-only designs but no real logo image. Coupled with sender profiling and anomaly detection algorithms, INKY supplies BEC security against these attacks before they are identified and logged by traditional email protection systems. Traditional email protection systems are working from a known database of attackers and scams.
INKY learns patterns with behavior profiling.
INKY works with any email clients
Report Phishing Attempts from any device
INKY’s state of the art machine learning and AI stops these other threats.
Phishing threats today are increasingly invisible.
According to Verizon’s 2018 Data Breach Investigations Report: 30% of phishing emails get opened by users.
© 2019 Inky Phish Fence For Office 365. Copyright © 2017 Inky Technology Corporation is the creator of Inky® Secure Email