Business Email Security: Preventing BEC and Phishing

How to protect your organisation's email from business email compromise, phishing attacks, and domain spoofing — covering technical controls, procedural defences, and incident response for Hong Kong businesses.

Business email security Hong Kong
1Email Threat Landscape

Business Email Threats Facing Hong Kong Organisations

Email remains the most exploited attack vector against Hong Kong businesses. Despite advances in security technology, email's open architecture — designed for interoperability, not security — creates persistent vulnerabilities. Three primary email-based threats cause the majority of financial and operational damage to HK organisations: business email compromise (BEC), which exploits email to initiate fraudulent financial transactions; phishing, which uses email to steal credentials or deliver malware; and domain spoofing, which allows attackers to send emails appearing to come from your organisation's domain.

Business email compromise has become the highest-loss cybercrime category for Hong Kong businesses. Attackers either compromise a legitimate business email account (by stealing credentials or exploiting a vulnerability) or impersonate a business account through domain spoofing or lookalike domains. Once they have a convincing email identity, they manipulate recipients — typically accounts payable staff, CFOs, or payroll administrators — into initiating fraudulent wire transfers, changing vendor banking details, or redirecting payroll payments. The FBI's IC3 reports that BEC losses exceed all other cybercrime categories combined globally, and Hong Kong's dense commercial email environment makes it a high-value target.

Phishing targeting HK business email addresses delivers both credential-stealing pages (fake Microsoft 365 login pages that harvest corporate credentials) and malware payloads (ransomware, banking trojans, and RATs delivered through malicious attachments or links). Corporate email accounts are particularly valuable targets because they provide access to sensitive business communications, internal systems via SSO (Single Sign-On), and the social engineering leverage of a trusted business identity that can be used to attack your customers and partners.

  • BEC as primary financial loss driver: Business email compromise causes the highest total losses of any cybercrime category against HK businesses
  • Credential phishing targeting M365/Google: Fake Microsoft 365 and Google Workspace login pages harvest corporate credentials that provide broad organisational access
  • Domain spoofing and lookalike domains: Attackers register domains similar to yours (companyname-hk.com) to send convincing fraudulent emails to your partners and customers
  • Malicious attachment delivery: Phishing emails deliver ransomware and RATs through macro-enabled Office documents, PDFs, and executable attachments
  • Supply chain email attacks: Compromised supplier or partner email accounts send convincing requests for payment detail changes targeting your accounts payable
  • Internal email compromise lateral movement: Compromised employee email accounts are used to pivot within the organisation — trust in internal senders is weaponised
Business email threat landscape
2Email Authentication

Implementing DMARC, DKIM, and SPF for Your Domain

Three DNS-based email authentication standards — SPF, DKIM, and DMARC — work together to prevent your domain from being spoofed in phishing and BEC attacks, and to ensure emails you send are authenticated by recipients. Implementing all three correctly is the most impactful technical email security action available to any Hong Kong business. Major email providers (Gmail, Microsoft 365) increasingly treat email from domains without DMARC enforcement as higher-risk, making proper configuration important for deliverability as well as security.

SPF (Sender Policy Framework) publishes a DNS record listing the mail servers authorised to send email from your domain. Email servers receiving mail from your domain check whether it originated from an SPF-authorised source. DKIM (DomainKeys Identified Mail) adds a cryptographic signature to outgoing emails that recipients can verify against a public key published in DNS — proving the message was not tampered with in transit. DMARC (Domain-based Message Authentication, Reporting, and Conformance) builds on SPF and DKIM by specifying what receiving servers should do with emails that fail authentication: monitor (p=none), quarantine (p=quarantine), or reject (p=reject).

Most Hong Kong businesses should implement DMARC in monitor mode (p=none) initially to understand the volume and sources of legitimate email from their domain without disrupting mail flow. Review DMARC aggregate reports (sent to the email address specified in your DMARC record) to identify all legitimate email sources before advancing to quarantine or reject. Advance to p=reject only after confirming all legitimate sending sources are covered by SPF or DKIM — enforcement on a domain with incomplete coverage can disrupt legitimate email delivery. Services like dmarcian, EasyDMARC, and Postmark's DMARC tool simplify DMARC report analysis for non-specialist HK businesses.

  • SPF implementation: Publish an SPF record listing all authorised mail servers for your domain — consult Microsoft 365 or Google Workspace documentation for the correct record format
  • DKIM configuration: Enable DKIM signing in Microsoft 365 or Google Workspace admin centre and publish the selector keys in DNS
  • DMARC in monitor mode first: Start with p=none DMARC and review aggregate reports for 2-4 weeks before advancing to quarantine or reject enforcement
  • DMARC report monitoring: Use DMARC report analysis tools to identify all legitimate sending sources before enforcement — prevent disrupting business email delivery
  • Progress to p=reject: Advance to DMARC reject enforcement after confirming all legitimate sources are authenticated — prevents your domain from being used in BEC and phishing attacks
  • All owned domains: Configure DMARC for all domains you own, including parked domains used for redirects — attackers register lookalike subdomains if parent domain has no DMARC
DMARC DKIM SPF configuration
3Email Gateway Security

Email Security Gateway and Advanced Threat Protection

Email security gateways — either on-premises appliances or cloud-based services — filter inbound and outbound email for threats before they reach employee inboxes. Microsoft 365 includes Defender for Office 365 (formerly ATP) at higher subscription tiers, providing phishing simulation, anti-malware scanning, safe links URL inspection, and safe attachments sandboxing. Google Workspace includes similar capabilities through Google's AI-based email threat detection. For organisations needing more advanced capabilities, dedicated email security gateways from Proofpoint, Mimecast, and Abnormal Security provide additional layers of detection, particularly for advanced BEC attacks that evade basic filters.

Safe attachments sandboxing — where potentially malicious attachments are executed in an isolated environment before being delivered to recipients — is particularly valuable for preventing malware delivery through email. Without sandboxing, novel malware in attachments bypasses signature-based scanning. With sandboxing, the malware's behaviour is observed in isolation and the email quarantined if malicious activity is detected before the recipient ever sees it. Enable safe attachments in Microsoft Defender for Office 365 or equivalent Google Workspace advanced protection settings.

Impersonation protection specifically targets BEC attacks that impersonate executives, known suppliers, or business partners. Microsoft Defender for Office 365's anti-phishing policies can be configured with a list of high-value impersonation targets — when an email claims to be from these individuals but is not authenticated as genuine, additional warnings are applied or the email is quarantined. This creates targeted protection for the executive impersonation scenario that drives the majority of BEC wire transfer fraud.

  • Microsoft Defender for Office 365: Enable advanced threat protection capabilities in Microsoft 365 — safe links, safe attachments, anti-phishing, and impersonation protection
  • Safe attachments sandboxing: Enable attachment sandboxing to detonate suspicious files before delivery — prevents novel malware reaching employee inboxes
  • Safe links URL inspection: Enable time-of-click URL inspection to catch malicious links even when URLs are changed after initial scanning
  • Impersonation protection list: Configure anti-phishing policies with a list of executives, finance staff, and key suppliers for targeted impersonation protection
  • External email warning banners: Apply visual warnings to email received from outside your organisation — reduces risk of internal impersonation tricks
  • Outbound email filtering: Configure outbound email filtering to detect and block data exfiltration and accidental transmission of sensitive data via email
Email security gateway
4Procedural BEC Defences

Procedural Controls That Block BEC Wire Transfer Fraud

Technical email security controls significantly reduce phishing and malware delivery success rates, but the most financially damaging email threat — BEC wire transfer fraud — frequently bypasses technical controls by impersonating genuine communication channels. Determined BEC operators use actual compromised email accounts, register near-identical domains, or intercept genuine email threads. Against these techniques, procedural controls — payment verification procedures, authorisation policies, and staff training — are the decisive defence layer.

The core procedural BEC defence is mandatory secondary verification for all wire transfers above a defined threshold. Any payment request received via email — regardless of the apparent sender's authority — must be verbally confirmed with the requester using a phone number independently known to the verifier (not a number provided in the email). This simple procedure defeats BEC attacks where an attacker impersonates the CFO or CEO by email requesting urgent transfers. The attacker cannot intercept a phone call to the real executive's known mobile number. Documented payment verification procedures, signed by leadership and enforced without exception, eliminate this attack pathway.

Bank detail change procedures close the supplier payment diversion variant. Any request to update a supplier's banking details must be processed through a formal verification workflow: written authorisation from the supplier through an authenticated channel, phone verification using a contact number from your existing supplier records (not the change request), management co-authorisation, and IT security notification. This workflow must apply without exception — a single ad hoc banking detail change processed outside the procedure creates the vulnerability that BEC operators exploit.

  • Payment verification procedure: Mandatory verbal confirmation via a known phone number for all wire transfers above a defined threshold — documented and enforced without exception
  • Bank detail change workflow: Formal multi-step verification for any supplier banking detail change — no changes processed based on email alone
  • Finance staff BEC training: Finance and accounts payable staff need intensive, specific training on recognising BEC patterns and applying verification procedures under pressure
  • Four-eyes principle for large transfers: Require two separate employees to authorise all transfers above a defined threshold — neither alone can initiate and approve
  • Executive override culture: Brief executives on BEC and instruct them to support verification procedures — a CFO who overrides verification "because I'm the CFO" creates the vulnerability
  • Incident response for BEC: If BEC fraud is discovered, immediately call the bank and police — prompt action can freeze the receiving account before funds are withdrawn
BEC prevention procedures

Protect Your Business Email from BEC and Phishing

Explore our complete Business Cybersecurity guide for all aspects of email security and beyond for Hong Kong organisations.

Related VPN Articles