![](https://images.squarespace-cdn.com/content/v1/62b362bfbe334e15a561a863/6a864be5-ad97-45b0-b879-56e34750a101/Kotman+Tech+Aug22-20.jpg)
BLOG
![Understanding Business Email Compromise (BEC) Scams](https://images.squarespace-cdn.com/content/v1/62b362bfbe334e15a561a863/1694211415148-BHXZ07ZVY75WRAZINU58/image-asset.jpeg)
Understanding Business Email Compromise (BEC) Scams
In today's digital age, the threat landscape is ever-evolving, and businesses are facing sophisticated cyber-attacks. One such menace that has been making headlines is the Business Email Compromise (BEC) scam.
![What’s That Term?: Trojan Horse](https://images.squarespace-cdn.com/content/v1/62b362bfbe334e15a561a863/1680840354442-YRYTWW6GJS6P0A0WB8T7/unsplash-image-64YrPKiguAE.jpg)
What’s That Term?: Trojan Horse
The term "Trojan horse" may sound like something out of ancient Greek mythology, but it is also a term used in the cybersecurity world to describe a type of malware that can wreak havoc on a victim's computer.