Business Email Compromise (BEC)

Your company inboxes can be an easy gateway to a data attack. We have the capacity to rapidly scan years’ worth of emails and attachments to identify sensitive data contained in the communications. We’ll provide you a report of sensitive data findings, impacted subjects to help the notification process, identify exfiltrated passwords and usernames, and provide any client requested information (e.g., ‘Crown Jewel’ or Intellectual Property) found inside of messages and attachments.

Advantages

Leverage data insights to reduce the impact of email compromise 

Business Email Compromise (BEC) is one of the most common forms of data breach felt in today’s cyber landscape.  Actfore leverages people, process, and technology to quickly deliver value; uncovering what information was taken and its importance.  A quick and efficient response not only allows you to control the message, but enables your business to make decisions based on facts and solid evidence.

With 100+ elements available for extraction, we can meet your Bec needs with ease

FIRST_NAME

LAST_NAME

MIDDLE_INITIAL

SUFFIX

STREET_ADDRESS

CITY

STATE

ZIP

COUNTRY

NATIONAL_ID

DATE_OF_BIRTH

PASSPORT_NUM

DRIVERS_LICENSE

LICENSE_STATE

STATE_ID

EIN/TAX_ID

ALIEN_REGISTRATION

TRIBAL_ID

VISA

NON_US_ID

BIRTH_CERTIFICATE

MARRIAGE_CERTIFICATE

FINANCIAL_DOCS

BANK_ACCOUNTS

ROUTING_NUMBERS

UTILITY BILLS

CREDIT/DEBIT_NUMBERS

CCV/PIN_NUMBERS

EXPIRATION_DATES

MEDICAL_HISTORY

DISABILITY_INFO

OCCUPATIONAL_HEALTH

MENTAL_TREATMENT

PHYSICAL_TREATMENT

DIAGNOSIS_INFO

PRESCRIPTION_INFO

PHYSICIAN

PATIENT_ID

INSURANCE_INFO

POLICY_NUMBERS

SUBSCRIBER_NUMBERS

GROUP/PLAN_NUMBERS

DNA_PROFILE

USERNAME

PASSWORDS

BIOMETRIC_IDS

IRS_PIN

SECURITY_Q&A

DIGITAL_SIGNATURES

MAIDEN_NAMES

Data Insights

Leveraging cutting edge technologies, our Analysts will uncover the business-critical and sensitive information exposed to the threat actors.

Expedited Answers

With BECs costing millions per year, leverage the speed of AI data mining to reduce the timeline to critical answers. At this critical junction, every hour matters.

Actionable Reports

Our suite of out-of-the-box reports, allows Actfore data analysts to provide you with the mission critical deliverables to get ahead of the threat actors.

Featured Capabilities

Time and money matter when responding

At Actfore, we utilize cutting edge technologies to programatically respond to data mining on Business Email Compromise (BEC) cases. Our technology stack and differentiators allow us to deliver faster and reduce the cost of traditional mining activities. With our Fixed Price model and our speed to delivery, you’ll never be sitting in the dark wondering what’s happening.

  • On-prem, cloud, or off-site analysis

    Our tools and team can deploy behind the client firewall or in their private cloud to process data, ensuring no additional data exfiltration will occur. Alternatively, our secure facilities allow us to migrate data to our forensic labs for analysis. Providing the greatest flexibility when responding to data breaches.

  • Native archive expansion

    Our tools have been purpose built to extract messages with their attachments from Archived file formats (e.g., PST), giving our analysts one interface for extraction of files, indexing of data, and textual analysis.

  • Deduplicating email threads

    Traditional mining efforts would look at each message from an email thread, expanding the level of effort drastically with redundant data. Our technologies allow us to deduplicate message data and extract only unique text and attachments throughout the threads.

  • Results under one roof

    Regardless of if you're looking for personally identifiable information (PII), protected health information (PHI), or business proprietary information (Crown Jewel) data, Actfore brings mining to the results under the roof of one software service provider.

Our Methods

A proven approach to quickly responding to BEC

Planning Phase

Data Analysis

Reporting

Kickoff &
Questions

Meeting to establish:
(a) elements for extraction or markup,
(b) client specific needs, and
(c) timeline.

Deployment &
Ingestion

Either on-prem, in the cloud, or in our lab, we will deploy our tools and connect to the data. An initial inventory of the data will provide high level findings.

Textual
Analysis

Our AI tools coupled with data analysts will begin textually analyzing the data, up to six times to capture all responsive elements.

Element
Coupling

With potentially numerous data elements and naming variants, we'll utilize our Data Subject Access Request (DSAR) capabilities to connect the dots.

Collapse
Related Entries

With sometimes millions of responsive elements, our team will collapse each responsive file down to a single entry per individual, increasing readability.

Review Format &
Publish

To ensure expectations are met and exceeded, we will review report formatting with all parties prior to publishing our final findings.

Why Actfore

Big data experts, looking to shed light on your data

At Actfore, we’re programmers and data experts, we’re not salespeople. Our team of experts are focused on uncovering the answers scattered across your data.  Let us handle your data challenges with speed and accuracy.