A practical case to illustrate this: New windows were installed at a company. After the work was completed, the final invoice was sent to the company. The accounting department complied with the request and paid the outstanding amount. Some time later, the company was contacted by the window installer and informed that the invoice was still outstanding. When the facts of the case were clarified, it emerged that the invoice the company had received had been manipulated and the payment information had been changed. As a cyberattack was suspected, the cyber forensics experts investigated the systems, emails, email server and invoice PDF. It turned out that the company’s email server had been compromised, allowing the email to be intercepted and manipulated by the attacker.