I have witnessed the damage caused by fake employees: this is what your company must do to avoid this
- Advertisement -
- Advertisement -
The increase in external and hybrid works, as well as digitization and networks of a wide range of devices and systems, has made the landscapes much more complex. Employees use so many devices – desktop computers, laptopsTablets, telephones – that it is all too easy to provide information unconsciously.
Although organizations that are exposed to cyber criminals is nothing new, more than half of the companies in the US and the UK are the target of a financial scam driven by ‘deepfake’ technology, which emphasize ‘deepfake’ scammers are a great concern.
Head of offensive security in Bridewell. The growing danger of ‘colleagues’ generated by AI
CEOs and CFOs have large digital footprints in today’s digital landscape. They have speeches, interviews and videos in many social media and business channels such as YouTube and LinkedIn and company websites.
And although generative AI has transformed the way in which people can work and the enormous amount of online content has now been available, it now offers to generate convincing in -depth material that are used worldwide by scammers.
In May 2024, the British engineering group Arup was duped to transfer $ 25 million to cyber criminals. The colleague Attended a video call, where everyone looked and sounded as well -known colleagues and bosses. But everyone in the call was a deepfake, ai-generated imitations of real people used to manipulate the employee to make the transfer.
This was also not an isolated incident. Advertisement group WPP was also the target for a deep -fake scam, but luckily it was not successful. The CEO of the group has detailed the attempt at fraud in an e -mail to leadership in detail and warned them to pay attention to calls that claim to be top managers.
The number of DeepFake attacks in the business world has risen in recent years. The use of fast progress and now widely available technology makes it possible, and people in workplaces are susceptible to fall for it.
Why is this important to you?
This DeepFake technology is a growing threat to companies, in particular through financial fraud and therefore when scam as it takes place, the damage is not only money, it can also come back to you. If you were the one who lived in the scammer, accidentally shared sensitive data or approved a fraudulent request, you could be held responsible, even if you did not know what was happening.
Ai-generated Deepfakes exploit the element of trust, so although cyber criminals may focus on your employer, you can be the access point. Business fraud undermines company Trust and public trust.
Your employer defending (and your job)
Given how quickly these threats evolve, organizations and their employees must guarantee sufficiently and develop policy rules to remain safe against exploitation.
Take the time and confirm
Make sure you investigate and verify before you respond to requests that are received digitally, especially if they contain a request to make sensitive information known or to carry out financial transactions. If you are encouraged to respond to requests via telephone or video call, call back with the channels you know to confirm the task.
Pay attention to signs of unusual behavior
If the voice of a colleague sounds a bit off or their camera seems strange blurry, it can be a sign of something unusual. Other signs that can indicate that something is wrong are, among other things, unnatural flashing or speech that is not synchronous with their lips. Ai and Deepfakes can cheat, but they are not perfect.
Create a culture of cyber consciousness
Encourage conversations with your colleagues with whom you can take a step back, pause and worry when you are worried about a request. And although AI can be useful for countless tasks, workplaces must have detailed guidelines on their use.
Check those present before they let in
If you are invited to a meeting, check the invitation to ensure that you know who the sender is. If you organize a meeting, it is worth engaging waiting rooms or lobbies so that you can approve who is joining.
Do not hesitate to question unusual IT assistance
If someone appears in a meeting who claims to be of it and you start asking to install software or to give him access, be careful. Instead, check with your IT department through your usual work channels about what the procedure is to make changes to your device.
We mention the best online cyber security course.
This article was produced as part of the TechRadarpro expert insight channel, where today we have the best and smartest spirits in the technology industry. The views expressed here are those of the author and are not necessarily those of TechRadarpro or Future PLC. If you are interested in contributing to find out more here: https://www.techradar.com/news/submit-your-story-techradar-pro
- Advertisement -