Business Email Compromise (BEC)
Advantages
Leverage data insights to reduce the impact of email compromise
Business Email Compromise (BEC) is one of the most common forms of data breach felt in today’s cyber landscape. Actfore leverages people, process, and technology to quickly deliver value; uncovering what information was taken and its importance. A quick and efficient response not only allows you to control the message, but enables your business to make decisions based on facts and solid evidence.
With 100+ elements available for extraction, we can meet your Bec needs with ease
FIRST_NAME
LAST_NAME
MIDDLE_INITIAL
SUFFIX
STREET_ADDRESS
CITY
STATE
ZIP
COUNTRY
NATIONAL_ID
DATE_OF_BIRTH
PASSPORT_NUM
DRIVERS_LICENSE
LICENSE_STATE
STATE_ID
EIN/TAX_ID
ALIEN_REGISTRATION
TRIBAL_ID
VISA
NON_US_ID
BIRTH_CERTIFICATE
MARRIAGE_CERTIFICATE
FINANCIAL_DOCS
BANK_ACCOUNTS
ROUTING_NUMBERS
UTILITY BILLS
CREDIT/DEBIT_NUMBERS
CCV/PIN_NUMBERS
EXPIRATION_DATES
MEDICAL_HISTORY
DISABILITY_INFO
OCCUPATIONAL_HEALTH
MENTAL_TREATMENT
PHYSICAL_TREATMENT
DIAGNOSIS_INFO
PRESCRIPTION_INFO
PHYSICIAN
PATIENT_ID
INSURANCE_INFO
POLICY_NUMBERS
SUBSCRIBER_NUMBERS
GROUP/PLAN_NUMBERS
DNA_PROFILE
USERNAME
PASSWORDS
BIOMETRIC_IDS
IRS_PIN
SECURITY_Q&A
DIGITAL_SIGNATURES
MAIDEN_NAMES
Data Insights
Leveraging cutting edge technologies, our Analysts will uncover the business-critical and sensitive information exposed to the threat actors.
Expedited Answers
With BECs costing millions per year, leverage the speed of AI data mining to reduce the timeline to critical answers. At this critical junction, every hour matters.
Actionable Reports
Our suite of out-of-the-box reports, allows Actfore data analysts to provide you with the mission critical deliverables to get ahead of the threat actors.
Featured Capabilities
Time and money matter when responding
At Actfore, we utilize cutting edge technologies to programatically respond to data mining on Business Email Compromise (BEC) cases. Our technology stack and differentiators allow us to deliver faster and reduce the cost of traditional mining activities. With our Fixed Price model and our speed to delivery, you’ll never be sitting in the dark wondering what’s happening.
On-prem, cloud, or off-site analysis
Our tools and team can deploy behind the client firewall or in their private cloud to process data, ensuring no additional data exfiltration will occur. Alternatively, our secure facilities allow us to migrate data to our forensic labs for analysis. Providing the greatest flexibility when responding to data breaches.
Native archive expansion
Our tools have been purpose built to extract messages with their attachments from Archived file formats (e.g., PST), giving our analysts one interface for extraction of files, indexing of data, and textual analysis.
Deduplicating email threads
Traditional mining efforts would look at each message from an email thread, expanding the level of effort drastically with redundant data. Our technologies allow us to deduplicate message data and extract only unique text and attachments throughout the threads.
Results under one roof
Regardless of if you're looking for personally identifiable information (PII), protected health information (PHI), or business proprietary information (Crown Jewel) data, Actfore brings mining to the results under the roof of one software service provider.
Our Methods
A proven approach to quickly responding to BEC
Planning Phase
Data Analysis
Reporting
Kickoff &
Questions
Meeting to establish:
(a) elements for extraction or markup,
(b) client specific needs, and
(c) timeline.
Deployment &
Ingestion
Either on-prem, in the cloud, or in our lab, we will deploy our tools and connect to the data. An initial inventory of the data will provide high level findings.
Textual
Analysis
Our AI tools coupled with data analysts will begin textually analyzing the data, up to six times to capture all responsive elements.
Element
Coupling
With potentially numerous data elements and naming variants, we'll utilize our Data Subject Access Request (DSAR) capabilities to connect the dots.
Collapse
Related Entries
With sometimes millions of responsive elements, our team will collapse each responsive file down to a single entry per individual, increasing readability.
Review Format &
Publish
To ensure expectations are met and exceeded, we will review report formatting with all parties prior to publishing our final findings.
Why Actfore
Big data experts, looking to shed light on your data
At Actfore, we’re programmers and data experts, we’re not salespeople. Our team of experts are focused on uncovering the answers scattered across your data. Let us handle your data challenges with speed and accuracy.