What Is Business Email Compromise (BEC)? UK SME Guide
A practical guide for UK businesses — explaining what this means, why it matters, and what you should do about it.
Overview
43% of UK businesses experienced a cybersecurity breach or attack in the past 12 months, equating to approximately 612,000 businesses (DSIT Cyber Security Breaches Survey 2025). 67% of medium businesses and 74% of large businesses reported breaches in 2025.
Learn moreWhat Is Business Email Compromise?
Business Email Compromise (BEC) is a sophisticated type of cybercrime in which attackers impersonate a trusted person — typically a senior executive, supplier, or solicitor — to trick employees into transferring money or handing over sensitive data. Unlike mass phishing campaigns, BEC attacks are highly targeted and often involve weeks of research into the victim organisation before a single email is sent.
UK businesses lost an average of £109,000 per BEC incident, according to industry data. Nearly 30% of BEC incidents lead to a direct funds transfer fraud event, making this one of the most financially damaging cyber threats facing SMEs today.
Common Types of BEC Attack
CEO Fraud
The attacker impersonates the chief executive or another senior leader and sends an urgent email to a finance team member requesting an immediate bank transfer. The message typically claims the payment is confidential, time-sensitive, and should bypass normal approval processes.
Invoice Redirection
Attackers intercept or spoof supplier communications and notify the target that the supplier's bank account details have changed. Payments are redirected to an account controlled by the criminal. This is also known as mandate fraud.
Supplier Impersonation
Criminals register domains that closely resemble a genuine supplier's domain (for example, amvia-invoices.com instead of amvia.co.uk) and send convincing invoices or payment requests. The target has no reason to suspect the email is fraudulent.
Payroll Diversion
Attackers impersonate an employee and request that their payroll direct debit is updated to a new account. The next payroll run sends salary directly to the fraudster.
Why BEC Attacks Are So Effective
BEC attacks succeed because they exploit trust rather than technology. They do not rely on malicious attachments or links that security tools might detect. The emails look legitimate, come from plausible addresses, and are timed to coincide with real business events such as a supplier invoice being due or the CEO being away on travel.
- Attackers research LinkedIn profiles, Companies House records, and company websites to identify targets
- Emails are crafted to match the writing style of the person being impersonated
- Urgency and authority are used to discourage staff from following normal verification procedures
- Many attacks are carried out over weeks, building credibility before the final request
How to Prevent Business Email Compromise
Technical Controls
Deploying DMARC, DKIM, and SPF email authentication records prevents criminals from spoofing your domain to attack your customers or partners. Microsoft Defender for Office 365 includes anti-impersonation protection that flags emails where the display name matches a known executive but the sending domain does not. AMVIA deploys and manages these controls as part of its managed email security service.
Multi-Step Payment Verification
No payment instruction received by email alone should be acted upon without a secondary verification step. Call the requester on a known telephone number — not a number provided in the suspicious email — to confirm. This single procedural control prevents the majority of BEC attacks that reach the payment stage.
Staff Training and Awareness
Finance, HR, and senior PA staff are the most common BEC targets. Regular training helps staff recognise the hallmarks of BEC — urgency, secrecy, unusual requests, and pressure to bypass normal process. Simulated BEC exercises test whether staff apply verification procedures under realistic pressure.
How AMVIA Helps UK Businesses Prevent BEC
AMVIA deploys Microsoft Defender for Office 365 to detect BEC patterns including lookalike domain spoofing, impersonation of internal executives, and unusual sending behaviour. We configure DMARC policies to protect your domain from being used in outbound fraud. Our managed service includes ongoing monitoring, alerting, and staff awareness support — giving your business layered protection against one of the most costly threats in the UK today.
Key Points
What you need to know.
Why It Matters
43% of UK businesses experienced a cybersecurity breach or attack in the past 12 months, equating to approximately 612,000 businesses (DSIT Cyber Security Breaches Survey 2025).
How It Works
67% of medium businesses and 74% of large businesses reported breaches in 2025.
UK Requirements
Relevant UK regulations, standards, and compliance considerations.
Getting Started
Practical first steps for businesses of any size.
Key Considerations
Assess your current position and identify gaps
Understand relevant UK regulations and standards
Implement appropriate technical controls
Train staff on security awareness
Review and update regularly
Consider managed service options for specialist areas
Frequently Asked Questions
Yes. UK small businesses face the same threats as larger organisations but often with fewer resources to address them. This guide is specifically written for SMEs.
AMVIA provides managed services that handle the technical complexity for you. We assess your current position, implement the right solutions, and manage them ongoing — so you can focus on your business.
Costs depend on your business size and requirements. AMVIA provides fixed monthly pricing with no hidden fees. Contact us for a tailored quote. <strong>Nearly 30% of BEC incidents lead to a funds transfer fraud event</strong>, with an average loss of £78,000 per case (Coalition 2025 Cyber Claims Report). <em>(Directcorporaterisks)</em>
Need Help With This?
AMVIA can assess your current position and recommend practical next steps.