In the context of a business email compromise (BEC), an incident refers to a specific situation or occurrence that poses a threat to an organization’s information security. It is a security breach or attack that has already occurred and has been identified. An incident typically involves unauthorized access or use of an organization’s email system, and it may result in the loss or theft of sensitive information.
An event, on the other hand, is any observable occurrence or action that has taken place within an organization’s IT environment. It can be something as simple as a user logging into their email account or an email being sent from an external source. Events can be both normal and abnormal and can be used to detect a potential incident.
In summary, an incident is an actual security breach that has occurred, whereas an event is an observable occurrence that may or may not lead to an incident. In the case of a BEC, an incident would be a successful attack on an organization’s email system, whereas an event could be a suspicious email that may or may not be part of a BEC attack.
Please note that this list of incident response steps is for educational purposes only and should not be considered as a guarantee against BEC attacks. Every organization’s IT environment is unique and may require a different approach to incident response. Additionally, cyber criminals are constantly finding new ways to circumvent security measures, and organizations must stay vigilant and continuously monitor and update their incident response plan to adapt to the new threat landscape.
It is important for organizations to consult with legal and cybersecurity experts to develop an incident response plan that is tailored to their specific needs and requirements.
Updated January 2023. Don’t become a victim of a cyber-attack. Start monitoring your network today.