Imagine the scenario. Your most valued client receives an email from you requesting an invoice payment. Being the great client that they are it’s processed promptly! The trouble is, that email wasn’t really from you. It was sent from a cyber attacker who’d gained access to your corporate network and spoofed your identity – tricking your client into making payments into criminal accounts.