In part 1 of this series, we looked at the rise of business email compromise (BEC) schemes and how they work. Next, we will explore who is liable and how to protect your business from such scams.
The question now becomes who is liable for the loss. In the above scenario, you made the payment to your supplier. However, the supplier never received the payment and is still owed money. The supplier expects to be paid. But, on the other hand, the imposter hacked the supplier’s computer system and imitated the supplier’s communications.
One could argue that it is the supplier’s fault that the funds were lost, as the supplier did not have sufficient security to protect its systems from being hacked. The misplaced confidence enabled another to commit fraud. Who is at fault? Who is liable? Both you and the supplier are victims of the hacker imposter.
Courts that have faced the question of who is liable for losses that occur due to a BEC scam have consistently held that losses attributable to fraud should be borne by the party in the best position to prevent the fraud.
The court is required to do a fact-specific analysis. Specifically, the court must ask who was in the best position to prevent the fraud and subsequent loss. The analysis is not about whether one party or another was negligent, but rather who was in the better position to prevent the fraud.
Some possible inquiries include:
Victims of BECs have found little success in seeking recourse against their financial institutions. For example, in Peter E. Shapiro, P.A., v. Wells Fargo Bank, 795 F. App’x 741, 743 (11th Cir. 2019), the Eleventh Circuit held that the bank was not liable, reasoning the bank “maintained and complied with reasonable routines” by processing the payment through its automated system based on a valid account number alone, without regard to a mismatch between names of the account holder and the intended beneficiary, which was noted in the system’s audit trail but did not halt the transaction.
Today’s cyber landscape provides ample opportunities for criminals to facilitate large-scale fraud schemes. Cyberattacks come in many forms and are clearly on the rise. No organization is immune. The FBI states in its 2022 report that “cyber risk is a business risk.” As these threats of cyber-enabled fraud increase, companies must protect not only themselves but also their customers from these scams.
Accordingly, you should consider not “if” your business will experience a cyber attack but what you will do “when” your business experiences a cyber attack and what you can do to minimize liability risks. A proactive cyber security plan must include proactive steps, cyber insurance, and a strong incident response plan.
Email remains the most vulnerable threat vector for gaining access to corporate networks. When an email comes in from someone in a company that you have a relationship with, especially when it comes from what appears to be a correct email address, this can be harder to detect.
Businesses must prioritize regular training. The aim is to teach employees to resist phishing attempts. Employees should be educated on recognizing dangers and cybersecurity measures in order to be able to identify and recognize cyber scams. Remember that BEC scams are not reliant on a technical loophole or software breach but rather on an employee accepting the validity of a fraudulent email. Businesses can also limit what information can be communicated via email and establish policies that prohibit sensitive information, such as wiring instructions and bank account information, from being transmitted via email.
Businesses can implement additional security measures such as VPNs, multi-factor authentication, and endpoint/mobile device security solutions. To safeguard their data from ransomware attacks, businesses of all sizes should have backup and disaster recovery solutions and incident response procedures.
Including your employees in the solutions, staying vigilant, and understanding the risk is key to managing the risk. However, even if a business completes the most robust employee training and purchases the most sophisticated technology to further protect its systems, there is no guarantee your business will not be subject to a future cyber attack.
Properly insuring your business to cover yourself and your customers from the threat of a cyber attack is imperative. General insurance policies do not include cyber risk cover, some specifically exclude it. Despite the high frequency of cyber incidents experienced by businesses, research reveals that there is a significant gap in cyber insurance coverage, most notably among small businesses. It is likely that a portion of these businesses are not even aware that cyber insurance exists. However, it does, and it is well worth exploring.