{"id":68481,"date":"2026-04-29T11:01:50","date_gmt":"2026-04-29T16:01:50","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=68481"},"modified":"2026-04-29T13:29:16","modified_gmt":"2026-04-29T18:29:16","slug":"pine-bluff-phishing-bec-prevention","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/","title":{"rendered":"The $3.2M Phishing Lesson: BEC Prevention for Schools"},"content":{"rendered":"\n<p>In a world where digital communication is the backbone of every organization, a single compromised email can lead to a multi-million dollar disaster. The <a href=\"https:\/\/www.pbcommercial.com\/pbsd-victim-of-3-2-million-cybersecurity-incident\/\" target=\"_blank\" rel=\"noreferrer noopener\">Pine Bluff School District<\/a> (PBSD) recently became a high-profile example of this reality. By analyzing this incident, we can learn critical strategies for Business Email Compromise (BEC) prevention to secure our networks against sophisticated cybercriminals.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>What is Business Email Compromise (BEC)?<\/strong><\/p>\n\n\n\n<p>BEC is a targeted cyberattack where a criminal compromises a legitimate business email account to conduct unauthorized fund transfers or steal sensitive data. It is currently one of the most financially damaging forms of online fraud.<\/p>\n<\/blockquote>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What Happened in Pine Bluff?<\/h2>\n\n\n\n<p>The breach occurred when the district processed a wire transfer for over $3.2 million. The payment was intended for a legitimate construction project, but the money never reached the vendor.<\/p>\n\n\n\n<p>According to Superintendent Jennifer Barbaree, the theft was a textbook case of Business Email Compromise. Attackers gained access to a district employee\u2019s email account and intercepted an ongoing conversation regarding a real invoice. They then sent fraudulent wiring instructions that mimicked authentic communications from the trusted vendor. Because the email thread appeared legitimate, the district followed the instructions and sent the funds directly to the hackers.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Why BEC Remains a Top Threat<\/h2>\n\n\n\n<p>This incident highlights a critical truth in cybersecurity. Most modern breaches do not involve complex &#8220;hacking&#8221; of a firewall. Instead, they target the human element. Once an attacker has access to an internal email account, they can watch conversations and strike at the perfect moment to redirect payments.<\/p>\n\n\n\n<p>The PBSD is currently working with the FBI and the Arkansas Cyber-Response Board to recover the funds. While they expect to recover a portion of the money, the operational disruption and loss of public trust are harder to repair.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How to Protect Your Organization<\/h2>\n\n\n\n<p>The district has since implemented new rules, such as requiring verbal confirmation for all wire transfers and ending the reliance on email for financial instructions. However, technical safeguards are just as vital as policy changes.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">1 &#8211; The Power of Application Allowlisting<\/h4>\n\n\n\n<p>Traditional antivirus software often waits to identify a virus before it acts. In a sophisticated phishing attack, this might be too late. This is where a solution like <strong><a href=\"http:\/\/pcmatic.com\/pro\">PC Matic Pro<\/a><\/strong> makes a massive difference.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.pcmatic.com\/pro\/\" target=\"_blank\" rel=\"noreferrer noopener\">PC Matic Pro<\/a><\/strong> uses a strategy called Application Allowlisting. Rather than trying to keep a list of &#8220;bad&#8221; files, it only allows &#8220;good,&#8221; known files to run on your system. If a cybercriminal sends a phishing email with a malicious attachment, <strong><a href=\"https:\/\/www.pcmatic.com\/pro\/\" target=\"_blank\" rel=\"noreferrer noopener\">PC Matic Pro<\/a><\/strong> will block the payload from executing if the user clicks it.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">2 &#8211; Strengthened Identity Protection<\/h4>\n\n\n\n<p>Beyond software, effective BEC prevention requires these key steps:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Multi-Factor Authentication (MFA):<\/strong> This remains one of the most effective ways to prevent account takeovers. By requiring a second form of verification, MFA can block attackers even if they manage to steal an employee&#8217;s password through a phishing site.<\/li>\n\n\n\n<li><strong>Verification Protocols:<\/strong> Never change payment details based on an email alone. Always call a known contact at the vendor to verify changes.<\/li>\n\n\n\n<li><strong>Continuous Monitoring:<\/strong> Security tools should provide real-time visibility into what is happening on every device in the network.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>The Pine Bluff incident is a reminder that cybercrime is a business. These attackers are patient and professional. By combining strict internal policies with robust security software like <a href=\"https:\/\/www.pcmatic.com\/pro\/\" target=\"_blank\" rel=\"noreferrer noopener\">PC Matic Pro<\/a>, schools and businesses can build a defense that is strong enough to withstand even the most coordinated attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a world where digital communication is the backbone of every organization, a single compromised email can lead to a multi-million dollar disaster. The Pine Bluff School District (PBSD) recently became a high-profile example of this reality. By analyzing this incident, we can learn critical strategies for Business Email Compromise (BEC) prevention to secure our [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":68482,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6217],"tags":[6246,6250,5732,5041],"class_list":["post-68481","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-security","tag-application-allowlisting","tag-bec-prevention","tag-k12","tag-phishing-attack"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The $3.2M Phishing Lesson: BEC Prevention for Schools<\/title>\n<meta name=\"description\" content=\"In a world where digital communication is the backbone of every organization, a single compromised email can lead to a multi-million dollar disaster. The\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The $3.2M Phishing Lesson: BEC Prevention for Schools\" \/>\n<meta property=\"og:description\" content=\"In a world where digital communication is the backbone of every organization, a single compromised email can lead to a multi-million dollar disaster. The\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-29T16:01:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-29T18:29:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-26.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pine-bluff-phishing-bec-prevention\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pine-bluff-phishing-bec-prevention\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"The $3.2M Phishing Lesson: BEC Prevention for Schools\",\"datePublished\":\"2026-04-29T16:01:50+00:00\",\"dateModified\":\"2026-04-29T18:29:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pine-bluff-phishing-bec-prevention\\\/\"},\"wordCount\":582,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pine-bluff-phishing-bec-prevention\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-1-26.jpg\",\"keywords\":[\"application allowlisting\",\"BEC prevention\",\"k12\",\"phishing attack\"],\"articleSection\":[\"Business Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pine-bluff-phishing-bec-prevention\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pine-bluff-phishing-bec-prevention\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pine-bluff-phishing-bec-prevention\\\/\",\"name\":\"The $3.2M Phishing Lesson: BEC Prevention for Schools\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pine-bluff-phishing-bec-prevention\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pine-bluff-phishing-bec-prevention\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-1-26.jpg\",\"datePublished\":\"2026-04-29T16:01:50+00:00\",\"dateModified\":\"2026-04-29T18:29:16+00:00\",\"description\":\"In a world where digital communication is the backbone of every organization, a single compromised email can lead to a multi-million dollar disaster. The\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pine-bluff-phishing-bec-prevention\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pine-bluff-phishing-bec-prevention\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pine-bluff-phishing-bec-prevention\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-1-26.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-1-26.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pine-bluff-phishing-bec-prevention\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The $3.2M Phishing Lesson: BEC Prevention for Schools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The $3.2M Phishing Lesson: BEC Prevention for Schools","description":"In a world where digital communication is the backbone of every organization, a single compromised email can lead to a multi-million dollar disaster. The","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/","og_locale":"en_US","og_type":"article","og_title":"The $3.2M Phishing Lesson: BEC Prevention for Schools","og_description":"In a world where digital communication is the backbone of every organization, a single compromised email can lead to a multi-million dollar disaster. The","og_url":"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2026-04-29T16:01:50+00:00","article_modified_time":"2026-04-29T18:29:16+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-26.jpg","type":"image\/jpeg"}],"author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"The $3.2M Phishing Lesson: BEC Prevention for Schools","datePublished":"2026-04-29T16:01:50+00:00","dateModified":"2026-04-29T18:29:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/"},"wordCount":582,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-26.jpg","keywords":["application allowlisting","BEC prevention","k12","phishing attack"],"articleSection":["Business Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/","url":"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/","name":"The $3.2M Phishing Lesson: BEC Prevention for Schools","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-26.jpg","datePublished":"2026-04-29T16:01:50+00:00","dateModified":"2026-04-29T18:29:16+00:00","description":"In a world where digital communication is the backbone of every organization, a single compromised email can lead to a multi-million dollar disaster. The","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-26.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-26.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/pine-bluff-phishing-bec-prevention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The $3.2M Phishing Lesson: BEC Prevention for Schools"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=68481"}],"version-history":[{"count":1,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68481\/revisions"}],"predecessor-version":[{"id":68483,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68481\/revisions\/68483"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/68482"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=68481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=68481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=68481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}