Home / Blog / Article
Email Security 15 March 2026 7 min read

What is business email compromise — and why small businesses are the main target

Business email compromise is the most financially damaging cyber threat facing UK businesses right now. It doesn't require sophisticated malware. It exploits trust — and small businesses, with less oversight and fewer approval processes, are far easier targets than enterprises.

Share

Your finance manager gets an email that looks like it's from the managing director. The message says a supplier payment needs to be made urgently — new bank details attached. The amount is £18,000. The email comes from the right name, uses the right tone, references a real project. It gets paid.

The money goes to a mule account controlled by criminals. It's gone within hours. You have almost no chance of getting it back.

This is business email compromise. It happens every day across the UK, and it doesn't require the attacker to have any technical skill beyond basic research and patience. Small businesses are the primary targets — not because they're specifically chosen, but because their processes are weaker, their payment approvals less formal, and their team members more likely to act on an email from "the boss" without questioning it.

How BEC actually works

There are several variants of BEC. The most common ones that affect small businesses are:

CEO fraud

The attacker impersonates a business owner or senior leader and emails a finance team member or operations manager asking them to make an urgent payment. The urgency is always part of the script — "I'm in a meeting, can't call, just get this done." The email address may be a lookalike domain (callum@getbulwark.co instead of callum@getbulwark.com), a free Gmail account with the right display name, or in worse cases, the actual business email account if it's been compromised.

Invoice fraud

The attacker either intercepts legitimate invoice emails or sends fake ones from spoofed supplier addresses. The invoice looks genuine — correct supplier name, logo, reference numbers — but the bank account details have been changed. A business pays what they believe is a normal supplier payment and discovers the fraud when the real supplier chases for money they never received.

Account takeover

The most dangerous variant. The attacker gains access to a legitimate company email account — usually through a phishing email or credential breach — and sits inside it silently for days or weeks. They read emails, understand the business, map out relationships and processes, and wait for the right moment. Then they send a payment request from within the genuine account, making it essentially indistinguishable from a real one.

"The most dangerous version isn't an attacker pretending to be you. It's an attacker who IS you — logged into your actual email account, reading everything, waiting."

Why small businesses are targeted more than large ones

Large enterprises have finance teams with dual-approval processes, treasury functions, and fraud detection systems. Making a £18,000 payment requires sign-off from two people and goes through a procurement system. The opportunity for BEC is narrow.

At a 10-person business, one person often handles everything from invoicing to supplier payments to payroll. The managing director is accessible by email and responds quickly. There's no formal purchase order process. A single email from the right person is often enough to initiate a payment.

Attackers know this. BEC targeting small businesses is largely automated at the research stage — public LinkedIn profiles, Companies House filings, and company websites provide the names, roles, and relationships needed to craft a convincing attack in minutes.

The three technical controls that reduce BEC risk

BEC has a people component that no technology fully solves — ultimately it relies on a human making a payment decision. But there are three technical controls that significantly reduce the attack surface:

Email authentication (SPF, DKIM, DMARC)

These records prevent attackers from sending emails that appear to come from your domain. A properly configured DMARC policy set to "reject" means that anyone attempting to spoof your company email address will have their message blocked before it reaches the recipient. This doesn't stop lookalike domain attacks, but it closes off direct spoofing.

Check your records now

Go to MXToolbox and check your domain for SPF, DKIM, and DMARC. If any are missing or set to p=none, you're vulnerable to domain spoofing. Read the full DMARC setup guide →

Multi-factor authentication on email accounts

Account takeover BEC — where the attacker operates from inside your actual email account — requires them to log in. If MFA is enforced, a stolen password isn't enough. This is the most direct defence against the account takeover variant of BEC.

If MFA isn't enforced yet

Read the full guide on how to enforce MFA on Google Workspace. It takes about 20 minutes to set up and eliminates the largest single attack vector for account compromise.

Monitoring suspicious login activity

Even with MFA, monitoring your Google Admin Console Alert Centre for unusual login patterns matters. A login from an unexpected country, at an unusual time, or from a new device is worth investigating. Google sends these alerts automatically — the question is whether anyone is reading them.

Is your email authentication set up correctly?

The free GetBulwark audit checks SPF, DKIM, DMARC, MFA, and 17 other controls. Written report within 48 hours. No obligation.

Book the free audit

The process control that matters as much as technology

Technology alone won't stop BEC because the final step — a human authorising a payment — is outside any technical control. The most effective supplementary process for small businesses is simple: a verbal confirmation rule for any payment over a set threshold or involving new bank details.

The rule: if you receive a request to pay a new bank account, or to change existing bank details, call the requester on a number you already have for them. Not reply to the email. Not text the number in the email. Call them on a number from your phone contacts or the company's verified contact list. Sixty seconds of friction prevents a significant percentage of successful BEC attempts.

Most small businesses that have been hit by BEC say the same thing afterwards: the instruction not to question it was baked into the request. "I'm in a meeting." "Do this before the end of today." "Don't bother calling, just get it done." Urgency and the removal of normal verification is always part of the attack. Teach your team to treat that urgency as a red flag rather than a reason to hurry.

Callum Fraser, Founder of GetBulwark
Callum Fraser
Founder, GetBulwark · Google Workspace Specialist

Read next

Email Security

DMARC explained — how to stop your domain being spoofed

Step-by-step setup guide for Google Workspace

Security Awareness

How to spot a phishing email in 2026

What modern phishing looks like and what to do if someone clicks

Most Workspace accounts have never been audited.

Find out where yours stands. 45 minutes, 20 controls reviewed, written report. The report is yours to keep.

Book your free audit