{"id":107250,"date":"2025-07-08T03:33:27","date_gmt":"2025-07-08T03:33:27","guid":{"rendered":"https:\/\/x-phy.com\/?p=107250"},"modified":"2025-10-08T05:02:53","modified_gmt":"2025-10-08T05:02:53","slug":"do-stop-believing-deepfakes-journey-to-be-the-new-cybersecurity-threat","status":"publish","type":"post","link":"https:\/\/x-phy.com\/do-stop-believing-deepfakes-journey-to-be-the-new-cybersecurity-threat\/","title":{"rendered":"Do stop believing: Deepfakes\u2019 journey to be the new cybersecurity threat"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Businesses today are confronted with unprecedented geopolitical and technological risks, making agility more crucial than ever. In a world where anything can change in an instant, organisations must adapt quickly to stay ahead and remain resilient in the face of constant disruption. One of the most pressing threats is cybersecurity, with the landscape heavily influenced by AI. The evolution of attacks since the inception of AI has been startling, as it has lowered the barrier to entry for the cybercriminal world. No longer does one need to be a skilled hacker to infiltrate a company\u2019s data &#8211; now, a simple prompt and AI can generate a sophisticated attack strategy for you.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">AI-generated deepfakes are a pressing threat. The \u2018innovation\u2019 of cyberthreats keeps evolving and the growth of deepfakes has been exponential. Deepfake content on social <\/span><span style=\"font-weight: 400;\">media alone grew <\/span><a href=\"https:\/\/www.deloitte.com\/uk\/en\/Industries\/tmt\/analysis\/the-rise-of-deepfakes-what-digital-platforms-and-technology-organizations-should-know.html\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">550% between 2019 and 2023<\/span><\/a><span style=\"font-weight: 400;\"> and there will be an estimated<\/span><a href=\"https:\/\/www.gov.uk\/government\/case-studies\/innovating-to-detect-deepfakes-and-protect-the-public\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">8 million deepfakes circulated in the UK in 2025.<\/span><\/a><span style=\"font-weight: 400;\"> With the World Economic Forum stating that it is a key global risk, this is something CIOs and business can\u2019t ignore.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/x-phy.com\/the-mark-carney-deepfake\/\">Deepfakes are AI-generated depictions of real-life people<\/a> and as AI has improved, so has its capability to produce even more believable \u2018individuals\u2019. At a time when there is more available content online than ever before, AI has a richer selection of assets to use to recreate voices and likenesses of people. These fake identities can then be introduced into virtual meetings, phone calls, or even training videos.\u00a0<\/span><\/p>\n<h3><b>Deepfakes exploit human trust<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">What makes deepfakes particularly dangerous is their ability to bypass traditional security defenses. They\u2019re designed to exploit human trust \u2013 our natural tendency to believe what we see and hear. It is often said that \u2018seeing is believing\u2019, but those days are at risk.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Deepfakes have already caused havoc in the political space. For example, a<\/span><a href=\"https:\/\/www.bbc.co.uk\/news\/uk-68146053\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">fabricated audio clip<\/span><\/a><span style=\"font-weight: 400;\"> of London Mayor Sadiq Khan almost led to serious public unrest as it showed \u2018him\u2019 making inflammatory remarks ahead of Armistice Day.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Similarly,<\/span><a href=\"https:\/\/www.ft.com\/content\/b977e8d4-664c-4ae4-8a8e-eb93bdf785ea\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">25 million dollars<\/span><\/a><span style=\"font-weight: 400;\"> was stolen from an engineering company after hackers used <\/span><a href=\"https:\/\/x-phy.com\/deepfake-attacks-could-cost-you-more-than-money\/\"><i><span style=\"font-weight: 400;\">\u201ca digitally cloned version of a senior manager to order financial transfers during a video conference.\u201d<\/span><\/i><\/a><\/p>\n<h3><b>Seeing is not believing<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The majority of employees recognise that an odd-looking email from the CEO asking for vouchers is likely a scam. In a moment of busyness, it might still fool people, but many can spot a poorly created scam phishing attempt. However, deepfakes require an entirely different level of cynicism. You can no longer assume anything is real just because it looks or sounds convincing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Policies and response plans need to be updated to reflect the appearance of deepfakes, incorporating steps for verifying video or audio content:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Establish clear policies<\/b><span style=\"font-weight: 400;\">: implement policies for the verification, detection, and escalation of deepfake threats.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Verify sensitive requests<\/b><span style=\"font-weight: 400;\">: any request involving money, credentials, or confidential data should always be subject to extra verification (e.g., via a call-back or secondary approval).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Adapt risk models<\/b><span style=\"font-weight: 400;\">: update risk models to consider how deepfakes could target critical business functions, such as executive communications, financial approvals, or customer interactions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Incorporate deepfake awareness<\/b><span style=\"font-weight: 400;\">: include deepfake recognition in regular cybersecurity training to help employees identify red flags and understand the scope of the threat<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">However, any organisation that leaves any of its cybersecurity posture down to human judgment will eventually suffer a breach.<\/span><\/p>\n<h3><b>AI is key to an all-encompassing cybersecurity posture\u00a0\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">AI is both the issue and the cure. As deepfakes become more believable and lifelike, AI on the \u2018other side\u2019 is improving at spotting what is real and what isn\u2019t. Innovative ML models, multi-modal AI especially, is becoming highly effective at spotting the telltale signs of a deepfake \u2013 including unnatural blinking, facial inconsistencies, or mismatched audio-visual elements \u2013 factors that can easily deceive the human eye.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yet, not all <a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/deepfake-detector\/\">deepfake detection solutions<\/a> have been created equal. Adopt one that is zero trust, application-agnostic and can detect deepfakes in real-time, especially on leading platforms like Teams, Zoom, Webex, Chrome, YouTube, and Meta. Also consider ease of adoption, prioritising seamless deployment with flexible options that suit varying enterprise needs. Every endpoint needs to be protected, and solutions that can be installed as a lightweight software agent on personal computers and laptops, or packaged with secure SSDs create a unified defence layer that spans data protection, ransomware prevention, and deepfake detection.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ultimately, for businesses to be truly secure from deepfakes, they need to start by defending the hardware and then expanding to establish a multilevel posture that monitors, flags and secures at every level. Adopting a secure-by-design approach is crucial. By deploying solutions that embed AI-driven security features into hardware and endpoints, businesses can ensure systems are operating and defending round the clock, even without the broader protection of a corporate network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This article was published on CIO Influence: <\/span><a href=\"https:\/\/cioinfluence.com\/security\/do-stop-believing-deepfakes-journey-to-be-the-new-cybersecurity-threat\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/cioinfluence.com\/security\/do-stop-believing-deepfakes-journey-to-be-the-new-cybersecurity-threat\/<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">To learn more about how our solutions can support your cybersecurity strategy, drop us a message at <\/span><a href=\"mailto:info@x-phy.com\"><span style=\"font-weight: 400;\">info@x-phy.com<\/span><\/a><span style=\"font-weight: 400;\"> and we\u2019ll get right back to you!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Businesses today are confronted with unprecedented geopolitical and technological risks, making agility more crucial than ever. In a world where anything can change in an instant, organisations must adapt quickly [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":107265,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[14,15],"tags":[],"class_list":["post-107250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-media","category-trends-and-developments"],"_links":{"self":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/107250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/comments?post=107250"}],"version-history":[{"count":1,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/107250\/revisions"}],"predecessor-version":[{"id":109038,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/107250\/revisions\/109038"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media\/107265"}],"wp:attachment":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media?parent=107250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/categories?post=107250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/tags?post=107250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}