Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business ResilienceBanking/Finance/Insurance

Are deepfake fraud risks overhyped? Where enterprises are exposed

By Baptiste Collot
Man holding a mask

Image via Unsplash

July 26, 2024

Deepfakes are the hot new enterprise risk. British engineering group Arup lost $25 million recently after scammers used AI deepfakes to falsely pose as the group’s CFO and request transfers from an employee to fraudulent bank accounts. 

But will deepfakes become the number one avenue for fraudsters to steal money? Likely not. There are far more common and pervasive cyber fraud attack methods, specifically business email compromise (BEC) schemes. Data shows that 83% of companies faced an increase in cyber fraud attempts from activity such as BEC attacks, hacking and highly sophisticated phishing schemes. In fact, fraudsters use BEC scams (31%) and hacking (31%) more often than deepfakes (11%) to dupe organizations.

Deepfakes are still a threat and it’s important for corporates to take steps to fight these types of attacks. But don’t get caught up in the hype and overlook BEC schemes as a critical point of entry. Actively bolster organizational defenses now. 

Today’s cyber fraud landscape

Cybersecurity and fraud prevention are now inextricably intertwined. The vast majority of cyberattacks are perpetrated to commit financial crimes such as payment fraud. Ninety-six percent of U.S. companies faced a payment fraud attempt in the past year, a 71% increase from the prior year. 

Once a cybercriminal breaches a company’s internal defenses, they go on the prowl to find weak links where they can steal money. The weak link is often human workers — especially those with access to financials and payments. A recent study found that 31% of employees made errors that could impact the security of their workplace. Falling victim to phishing scams and sharing passwords with colleagues were cited as top mistakes. Finance, treasury and procurement teams have become targets of fraudsters because they hold the purse strings. 

As AI advances, cybercriminals are scaling BEC attacks across thousands of companies simultaneously. AI is also making it significantly easier for fraudsters to write convincing phishing emails that are difficult for even the trained eye to spot as fraud. Social engineering-based BEC attacks have risen by 1,760% in the past year, mostly fueled by the advancements in generative AI. 

The main reason why BEC attacks are a far greater threat comes down to a general comfortability in certain channels of communication. Most professional workers would not share payment details or authorize a transaction on a video conference line. Sharing this sensitive information over email is much more common, making BEC attacks the one to watch for. 

Most organizations have robust firewalls, secure operating systems and intrusion detection systems but BEC attacks bypass these preventative measures through social engineering techniques where employees give up sensitive information over email and enable hackers to infiltrate their systems. These types of attacks can be much harder to spot, control and avoid.

For example, a fraudster may use a sophisticated phishing email to extract important information about a company’s payment process and target employees with access to that sensitive information. They will use an aggressive social engineering email scheme to trick that employee in charge of the payment information into wiring a seemingly real business payment to a fraudulent bank account. 

Most leaders believe their investments in cybersecurity measures are enough, but cybersecurity only goes so far if not backed by strong fraud prevention mechanisms. 

Where enterprises are exposed 

There are several main types of BEC scams where enterprises are exposed.

  • Invoice fraud: These appear to be emails from legitimate suppliers with real invoices, but the bank accounts belong to fraudsters. Thirty percent of U.S. companies faced this type of attack in 2023. 
  • CEO/CFO fraud: Emails from the CEO or senior executives’ accounts will request transfers of funds to fraudulent accounts. This type of attack is the third most common type of fraud. 
  • Hacked accounts: An employee’s email account will request invoice payments from suppliers. Payments are diverted to the scammer’s account.
  • Data theft: Employees in HR and accounts departments are targeted for personally identifiable information (PII) or tax information on employees. This can be used to divert payroll funds. 
  • Law firm information requests: Emails seemingly from a company’s law firm will request confidential information.

Sophisticated BEC attacks are varied and challenging to spot, meaning enterprises should prioritize the following defensive measures in the second half of 2024.

Three steps to protect against BEC attacks 

Companies have three clear steps they can take to fight back against BEC attacks. 

1. Implement two lines of defenses

Data breaches have surged to an all-time high, with over 17 billion records compromised in 2023. Despite significant investment in cyber defenses, it’s not working. Fraud prevention investment is lagging, with only 28% of companies reporting they have fraud prevention tech in place. 

Consider implementing fraud prevention software that will stop fraudsters in their tracks by using automation to confirm that each business payment is going to a legitimate bank account that matches the company they are supposed to be paying. Even if a criminal gets access to a vendor's email account and requests a payment to a fraudulent bank account, technology can flag the illegitimacy of the bank account before the fraudster steals millions. 

2. Ensure payment data is accurate 

Companies often think that the risk of fraud comes from the payment itself. In fact, the risk comes from the payment data. Large companies work with thousands of vendors. Vendor data is not always accurate or up-to-date. It is estimated that 30% of existing vendor data in financial systems is outdated, whether because a vendor decides to work with a new bank, is acquired by another organization, or another reason. Those changes don’t always get captured in organizations’ vendor databases, which exposes them to fraud.

Preventing fraud requires regularly and actively screening and cleaning vendor data, making sure it’s up to date and then validating the account at the time of payment so organizations are confidently paying the right vendor every time.

3. Enable collaboration across internal teams associated with payments 

Finance, treasury and procurement professionals all share responsibility for fraud prevention. Each plays a different role. But today, most of these teams operate in silos, with little to no communication and visibility around payments. And often, each team thinks the other is primarily responsible for the fight against fraud. 

The moments in between process handoffs can easily be exploited by fraudsters using sophisticated BEC attacks. They could request a change to bank account information right after the finance team takes over, without procurement knowing or being able to confirm whether the change is fraudulent. It’s important to create a culture of collaboration with the teams associated with payments — and enable them with technology that can monitor the potential risks and enable teams to address them before fraud happens. 

Looking forward

Deepfakes are the shiny new toy for fraudsters. As deepfakes enter the cybersecurity and fraud prevention conversation, outsized hype has been placed on their risks. It’s important that leaders do not overlook BEC attacks, as they are a critically vulnerable entry point for fraudsters to swipe millions. 

KEYWORDS: business email compromise (BEC) fraud fraud prevention fraud trends

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Baptiste collot headshot

Baptiste Collot is Co-Founder and CEO at Trustpair. Image courtesy of Collot

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Extremism in the United States: where are the risks and what security enterprises can do regarding extremism

    Extremism in the United States in 2021: What’s out there and where are the risks?

    See More
  • artificial intelligence

    AI – Where Are We Now and Where Are We Going?

    See More
  • Generic Image for Cyber Security

    The Cloud: Where Your Partners’ Security Problems Are Yours

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!