medium
Single Answer
0Chuck wants to help his organization protect against business email compromise (BEC) attacks. Which of the following is not a common best practice to defend against BEC?
Answer Options
A
Delete all attachments from emails.
B
Use two-factor authentication.
C
Review suspicious email carefully for typos and other indicators.
D
Don't click URLs in unsolicited emails—visit URLs manually.
Correct Answer: A
Explanation
While attachments are a common vector for BEC attacks, deleting all attachments is not a common practice. Instead, users should be taught to be careful about clicking on and opening attachments, particularly on unsolicited email. Using two-factor authentication, reviewing suspicious emails for potential indicators of BEC, and not clicking on URLs but instead visiting sites manually are all common anti-BEC practices.