Security experts have long warned of the dangers of spear-fishing and business email compromise, With the emergence of deepfakes, employees must now take care when dealing with audio and video messages, as well.
HOBOKEN, N.J. (PRWEB) March 11, 2020
A NYC area IT security consultant and managed services provider (MSP) shares how voice cloning technology enables a new level of cyber security threat in a new article on the eMazzanti Technologies website. The informative article explains how cyber criminals can use just a few seconds of audio and cloning software to create a believable voice impersonation.
The author then shares tips to avoid being scammed by high-quality voice or video fakes, including increased awareness, asking questions of suspicious callers and staying abreast of emerging cyber security technology.
“Security experts have long warned of the dangers of spear-fishing and business email compromise,” stated Almi Dumi, CISO, eMazzanti Technologies. “With the emergence of deepfakes, employees must now take care when dealing with audio and video messages, as well.”
Below are a few excerpts from the article, “Voice Cloning Elevates Security Threats to the Next Level.”
“Last year, scammers convinced a director at a British company to send them $240,000. Using voice cloning, they impersonated a senior executive at the company, instructing the director to wire the sum to a secret account. Recognizing his boss’s voice, he complied, only becoming suspicious when the thieves called a second time.”
“While this may represent one of the first artificial intelligence (AI) heists on record, it will hardly be the last. Consider the possibilities. If bad actors use voice cloning technology to steal money from businesses, they can easily sabotage political elections or impersonate family members.”
Dangers of Increasingly Sophisticated Voice Cloning
“Voice cloning presents an example of just one type of “deepfake.” The term comes from “deep learning,” a type of machine learning that roughly mimics the human brain. While the technology has existed in some form for at least a couple of decades, advancements have made it easily accessible and difficult to detect.”
“For instance, using just a few seconds of audio, cloning software can create a believable voice impersonation. With more extensive audio samples, often publicly available through social media and news, users can create a fake almost impossible to detect. The counterfeit voice convincingly mimics speech patterns, accent and voice inflections.”
Protect Against Emerging Threats
As technology grows more sophisticated, business leaders should evolve their security measures to match the threat. This involves a multi-prong approach, including training, policy development and employing emerging cyber security technologies.
The security experts at eMazzanti keep abreast of threats and security tools as they evolve. They can guide you through the process of understanding the organization’s security needs and implementing a strategy to address them.
Have you read?
About eMazzanti Technologies
eMazzanti’s team of trained, certified IT experts rapidly deliver increased revenue growth, data security and productivity for clients ranging from law firms to high-end global retailers, providing advanced retail and payment technology, cloud and mobile solutions, multi-site implementations, 24×7 outsourced network management, remote monitoring and support.
eMazzanti has made the Inc. 5000 list eight consecutive years, is a 4X Microsoft Partner of the Year, the #1 ranked NYC area MSP and NJ Business of the Year! Contact: 1-866-362-9926, email@example.com or http://www.emazzanti.net Twitter: @emazzanti Facebook: Facebook.com/emazzantitechnologies.