Security alert: Attacks on business email accounts are surging
June 8, 2022
|
4
min read

Highlights
Business email accounts are like goldmines for cyber criminals – so it’s important to know how to keep yours safe…
Email has become an essential tool for any successful business, but as the saying goes, "with great power comes great responsibility".
As a business owner, it’s your responsibility to make sure your emails are secure. It’s one of the key ways to stop your business data falling into the wrong hands.
Business Email Compromise (or BEC) is a growing threat. And if you become a target, it could cost you – big time.
So, what exactly is a BEC attack?
In simple terms, it’s where scammers pose as people high up in the business, like CEOs, executives, and IT staff. The goal is to trick your employees into sharing sensitive information or sending money. Research shows that nearly 90% of BEC attacks are set up this way.
It’s easy to see how someone might quickly respond without a second thought, especially when they trust the sender.
BEC attacks have spiked dramatically this year, especially over the third quarter. Researchers have analysed 1.8 billion emails worldwide, discovering a shocking 208 million malicious emails among them. And of these malicious emails, more than half (58%) were BEC attempts.
The figures make it clear: BEC scams are now the biggest email threat to businesses.
Another thing worth noting? Most BEC scams target employees lower in the business, who might be less likely to question authority or be less aware of cyber threats.
Although BEC attacks are common, it’s also important to remember that scammers still use other methods too. This includes commercial spam and phishing attacks, which are designed to trick people into sharing personal information, like login details.
In fact, the combined effect of these types of scams now overshadows traditional ransomware and malware attacks.
Luckily, it isn’t complicated or expensive to protect your business.
Simply make sure that all members of your team are trained to think twice about every email they receive.
If an email asks for sensitive information or a financial transaction – especially if it feels urgent – your employees should know to stop and check with someone before they action anything.
If you need help making sure your business is secure, get in touch.
Tell us about yourself so we can serve you best.
Got a question?
More articles
.png)
This special edition of our Leading London series brings together the partners behind the rollout of the City of London Corporation’s new unified network, a major upgrade designed to strengthen public services and improve connectivity across the Square Mile and beyond.
The panel included:
- Sam Collins, Assistant Director of Digital and Data, City of London Corporation
- Chelsea Chamberlin, Chief Technology Officer, Roc Technologies
- Scott McKinnon, Chief Security Officer, Palo Alto Networks
- Rhod Morgan, Chief Operations Officer, Vorboss
- Elliot Townsend, Senior Director, Juniper Networks
- Christa Elizabeth Norton, Marketing Director, Roc Technologies
Together, they explored how the new network will improve public services, strengthen cyber resilience and support a more connected, future-ready City.

For many landlords and building managers, the word “wayleave” feels like the responsible route whenever a fibre circuit is being installed on their property. It sounds formal and safe – a neat legal box to tick.
In many cases, however, a wayleave adds unnecessary complexity and delays, frustrates tenants, and can expose landlords to long-term legal risks.
At Vorboss, we’ve connected thousands of office spaces across London without a wayleave, keeping landlords in full control and getting tenants online faster.

What is a wayleave?
A wayleave is a written agreement between a landowner and a telecoms operator. It gives the operator permission to install and keep equipment on private property.
What many people don’t realise is that signing a wayleave also activates “Code rights” under the Electronic Communications Code. These rights go beyond simple permission, they give the operator legal powers to stay on the property indefinitely, access it when needed, and even refuse removal of their equipment in certain situations.
For a typical connection into a commercial building in London, a wayleave can make the fibre installation process slower, more expensive, and limit the landlord’s flexibility long term.
Why a wayleave isn’t required for standard in-building fibre connections
For a standard in-building fibre connection serving a tenant, a wayleave isn’t a legal requirement. Important protections, like building access, fire safety, repairing any damage, and removing equipment, are already covered by the tenant’s lease and usual building rules.
If no wayleave is signed, no Code rights are triggered, meaning the landlord retains full control and the installation exists under a simple, fully revocable licence.
In practice, this gives landlords far more protection and flexibility:
- No legal lock-in – the telecoms operator has no long-term rights to stay or refuse removal.
- Landlords keep full control – equipment can be moved or removed when the building changes.
- Faster fibre installation – no time lost in drafting contracts or solicitor reviews.
- Happier tenants – connections go live quicker; tenants get to move in faster.
By contrast, signing a wayleave and granting Code rights introduces a complex and expensive legal process for any fibre removal or relocation. This can take at least 18 months, plus potential court or tribunal proceedings, making it slower, and far less flexible for the landlord.
.avif)

.avif)

