Deepfake technology utilizes machine learning and artificial intelligence (AI) to manipulate or create synthetic audio, video and images that appear authentic. Deepfakes are commonly featured in entertainment and politics to spread false information and propaganda. For instance, deepfake has been used to show a celebrity or leader saying something that they didn’t, and this creates fake news.
Unfortunately, in deepfakes, cybercriminals have found a new tool for cyberattacks. Cybercriminals are now using deepfakes to pose a variety of enterprise risks.
How Cybercriminals Are Using Deepfakes
Deepfake technology is now used to create scams, hoaxes and false claims that undermine and destabilize organizations. For instance, a manipulated video might show a senior executive associated with fake news, such as admitting to a financial crime or spreading misinformation about a company’s products. Such corporate sabotage costs a lot of time and money to disprove and can impact a business’s reputation.
Another way businesses can be negatively impacted is through social engineering attacks such as phishing, which relies on impersonation to compromise an email. Similarly, social engineering using deepfakes can feature voice or video impersonations. A good example of such an impersonation was reported in The Wall Street Journal, in which fraudsters used AI to mimic a CEO’s voice. This incident happened in March 2019, when criminals impersonated a chief executive’s voice to direct a payment of $243,000.
Cybercriminals are able to execute social engineering attacks by accessing readily available information online. They can research a business, employees and executives. The criminal will even use an actual event picked from social media – for instance, a financial director who is just returned to work from a holiday – to sound more legitimate.
This emerging security threat is also made possible by the development of video editing software that can swap faces and alter facial expressions. Such developments have enabled deepfakes to fool biometric checks (like facial recognition) to verify user identities.
The deepfake cybersecurity threat has become such a concern that the Federal Bureau of Investigation (FBI) has issued a Private Industry Notification (PIN) cautioning companies of the possible use of fake content in a newly defined cyberattack vector referred to as Business Identity Compromise (BIC).
How to be Prepared and Protect Against Deepfakes
Deepfake videos and images can be recognized by checking for unnatural body shape, lack of blinking in videos, unnatural facial expressions, abnormal skin color, bad lip-syncing, odd lighting, awkward head and body positioning, etc. However, cybercriminals keep evolving and creating more convincing deepfakes.
Other measures introduced to combat deepfakes include creating solutions that detect deepfakes. There also was an introduction of deepfake legislation in the National Defense Authorization Act (NDAA) in December 2019.
Unfortunately, this has not been enough, and enterprises have the task of helping reduce the impact of these attacks. The following measures can help:
- Use anti-fake technologies
Businesses should explore automated technologies that help identify deepfake attacks. They should also consider watermarking images and videos. - Enforce robust security protocols
Implement security protocols to help avoid deepfakes, such as automatic checks for any procedure involving payments. For instance, putting systems that allow verification through other mediums. - Develop new security standards
As security threats keep evolving, so should security standards within a company. For instance, introduce new security standards involving phone and video calls. - Training and awareness
Enterprises should enforce regular training and raise awareness among employees, management, and shareholders on the dangers of deepfakes to businesses. When all involved parties are trained to identify deepfake social engineering efforts, this will help reduce the chances of falling victim. - Keep user data private
Deepfake attackers use the information found in public domains such as social media. Although not a failsafe procedure, company profiles can be made private. Users also should avoid adding or connecting with strangers they don’t know and posting too much personal information online. - Disinformation response policy
Some deepfake incidents are out of control for an enterprise, such as fake videos purporting to be from top management. However, establishing a disinformation response plan will help in cases of a reputation crisis. This should include monitoring and curating all multimedia output – which will help present original content to the public as authentic content.
Conclusion
Deepfake is an emerging cybersecurity concern that requires enterprises to be aware of its potential threats and stay prepared. Although it might be possible to identify a poorly generated deepfake with the naked eye, the technology continues to advance. In response, countermeasures must keep pace.

Web browsers such as Google Chrome, Firefox, Safari and Edge, among others, play an essential role in enabling access to websites on the internet. Most browsers allow users to install extensions, also referred to as add-ons or plug-ins. These extensions are applications or small software modules that add functionality and other useful features to a browser.
Non-fungible tokens (NFTs) are rising in demand, and some brands are already generating great results in their campaigns and providing a unique experience to customers. As the hype around NFTs continues, businesses need to understand how they can benefit.
Today, businesses have to grapple with vast amounts of data from different sources, including emails, mailing lists, customer orders, system logs, mobile apps, social media networks, etc. This data is crucial to businesses in various ways. When analyzed, a business can identify operational issues, personalize the customer experience and manage supply chains – all contributing to better decision-making.
Cash flow awareness is vital in running the day-to-day activities of a business. Keeping track of the inflows and outflows helps a company make better plans and decisions, such as the right time to expand. Cash flow knowledge reveals where a business is spending money and can protect business relations, among other benefits. However, tracking cash flow is a challenge for many businesses.
Cybersecurity has become more important than ever, especially with the rise in cyberattacks. However, much focus is put on computers, laptops, servers, etc. Mobile phones and tablets seem to be overlooked when talking about cybersecurity.
Cybersecurity experts estimate that there is a ransomware attack every 11 seconds. This makes it a challenge to individuals, businesses and even governments.
Metaverse has become a buzzword with much debate on its potential implications once it is fully realized. As far as businesses are concerned, the metaverse presents new opportunities and challenges, especially for marketing, branding and communication professionals.
Certifications are not a new thing in the accounting industry. However, with new technology trends, accounting departments are faced with the challenge of taking courses in technology in order to carry out their tasks. Many businesses are ditching desktop-based accounting software and turning to cloud-based software. This requires that the users be well-versed with necessary skills to use the cloud accounting solution.
Technology has had a major impact on the accounting industry. Gone are days when technology was a second thought and accountants preferred the traditional methods to which they were accustomed. As we start another year, technology is also progressing rapidly. The recent business disruption by the COVID-19 pandemic also has contributed to the acceleration in tech adoption. A major lesson learned from the events of the past two years is the need for digital transformation and prioritizing technologies that will help businesses remain relevant.