Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity Education & Training

Help Desk Havoc: Why Identity Verification Is Still the Weakest Link in Targeted Attacks

By Bojan Simic
Help desk employees
Charanjeet Dhiman via Unsplash
October 10, 2025

Organizations are heavily investing in zero trust, a security framework that requires strict verification and ongoing monitoring of every user, device, and application. As of 2025, the size of the zero trust market is estimated at $38.37 billion USD and is projected to grow to $86.57 billion USD by 2030. Investments include not only tools but also organizational transformation, policy overhaul, and long-term architectural changes. 

When combined with strong, phishing-resistant multi-factor authentication (MFA) and AI-powered threat detection, a move toward zero trust will significantly enhance cybersecurity. However, help desks often lack robust identity verification, creating a critical vulnerability.

Help desks are often the first line of defense for malicious identity verification activity, yet are among the most under-protected entry points in the enterprise. Attackers treat it not as a support function but as a security weakness. 

Instead of brute-forcing logins or guessing passwords, cybercriminals call in, impersonate employees, and gain access. All it takes is a convincing story, a spoofed caller ID, and the helpfulness of an agent trying to assist someone in getting back to work. 

The Marks & Spencer breach and the 2023 MGM Resorts attack highlight this issue. The group Scattered Spider turned social engineering into a science. They impersonated staff, bypassed weak protocols, and caused massive disruption. They exploited outdated workflows, studying organizations and mimicking internal language to deceive help desks. In the MGM attack, their help desk social engineering event led to over $100 million in damages and widespread disruption across hotels, casinos and their digital infrastructure. 

These breaches resulted from process failures, not individual human error.

What’s Going Wrong

Help desks are particularly vulnerable because they sit at the intersection of legacy infrastructure, human interaction and urgent access needs. Most still authenticate users with static credentials, such as birthdates, maiden names, employee IDs, and “memorable answers,” which stem from the password-centric era. These convenient methods, however, were never designed for resilience. Over time, they’ve become predictable, easily phished, or widely available through breached data and public sources. 

The problem isn’t just technical. It’s procedural and psychological. Help desks often prioritize speed and rely on scripted questions and assumed trust. Attackers exploit this by impersonating users and manipulating routine procedures. They don’t need to break in. They just need to sound legitimate. 

Such social engineering is effective because it thrives on human empathy, urgency and the comfort of familiar protocols. Without modern safeguards, such as adaptive authentication, help desks remain vulnerable to attacks. Relying on assumptions instead of real-time signals leaves a dangerous gap between convenience and security. 

The Attackers Playbook 

Attackers now use deepfake voice technology and generative AI to imitate employees, which makes outdated verification methods obsolete. They easily bypass human skepticism and technical safeguards with alarming accuracy. 

Threat actors infiltrate with ease by:

  • Establishing credibility and trust using insider language.
  • Manipulating caller IDs to appear legitimate.
  • Exploiting weak verification protocols.
  • Capitalizing on assumptions to gain access. 

Most attacks start with reconnaissance. Cybercriminals scrape LinkedIn profiles, company bios and breach data to build believable personas. By the time they call your help desk, they sound like legitimate employees. It’s all in the preparation.

That preparation pays off when the real manipulation begins. Social engineering succeeds because it persuades people, not systems. Attackers create a sense of urgency, impersonate authority and exploit empathy. These are intentional tactics that convince individuals to bypass security measures, leading to breaches that appear to be routine support calls. 

Outdated systems, not the teams themselves, are the real issue for help desk teams, who often work under pressure with limited tools and visibility.

The Cost of Getting It Wrong

When attackers bypass weak verification, the consequences extend far beyond just one compromised account. The ripple effect is substantial.

Credential misuse is fueling a surge of breaches across industries. A recent report found that in retail alone, 58% of organizations have suffered incidents tied to compromised credentials. The average cost per incident is $6.27 million. These costs include:

  • Immediate expenses of investigation, containment and remediation
  • Long-term repercussions, such as regulatory penalties and class-action lawsuits
  • Loss of intellectual property
  • Decline in consumer trust and retention

The last point is critical. The same research reports a staggering 81% of consumers say they would stop doing business with a company after a breach involving their personal data. 

These breaches highlight a business continuity issue masquerading as a security concern. Failed authentication erodes trust, which is challenging to rebuild.

Why Identity Verification is the Help Desk’s First Line of Defense

Help desks are a prime target for identity-based attacks; yet, many organizations still rely on authentication, rather than identity verification. Verification methods based on shared secrets, like password resets, knowledge-based questions, and SMS-based MFA, collapse under social engineering. Attackers already have the answers, often gleaned from personal information easily gathered from public sources, data breaches, or internal leaks. 

Furthermore, those static, secret-driven controls can’t assess real-time risk or prove that the requester is who they claim to be. Unfortunately, under pressure, support agents often default to lenient verification, which can open the door to unauthorized access. 

An identity verification-first approach flips the script. By issuing cryptographic credentials tied to trusted endpoints and optional biometric checks, every reset request carries instant, context-aware proof of identity with no shared secrets required. 

Elevating identity verification as a foundational control locks down help desk workflows, slashes fraudulent resets and secures critical transactions in real time. It’s not an add-on but rather a critical element in stopping identity-based threats. 

What CISOs Can Do Now: Turn the Help Desk into a Strategic Asset

CISOs need to rethink the help desk. It’s not just a soft spot or a support channel. It’s a strategic asset in their zero trust strategy. With the right changes, the help desk becomes a powerful layer of defense. 

  • Adopting phishing-resistant authentication. Move beyond passwords and static credentials. Use FIDO2 security keys, biometric verification, and methods that can’t be easily spoofed or stolen.
  • Require access from registered, trusted devices to ensure only legitimate users are supported. 
  • Eliminate shared secrets. Stop relying on information that can be guessed, stolen or socially engineered. 
  • Enable real-time identity checks. Provide help desk teams with tools to quickly and securely confirm users’ presence and intent.

These steps empower frontline teams with the tools and training they need to protect the organization confidently, without unnecessary friction.

Elevating Help Desks to Identity Guardians

Traditionally, help desks are reactive troubleshooters that focus on resolving technical issues rather than safeguarding identity. Forward-looking organizations break down silos between IT, identity and security. They align these functions into a unified access strategy where every support interaction strengthens assurance.

For example, if a user is locked out, the help desk can trigger a biometric challenge or device-based verification. The user verifies their identity in real-time. No guesswork. No assumptions. Just proof. These efforts thwart impostors and streamline access for legitimate users, while reducing frustration and downtime and strengthening security.

Modern identity assurance transforms help desk agents into defenders who proactively detect anomalies and suspicious behavior, stopping breaches before they occur. This is the essential evolution for today’s help desk.

KEYWORDS: identity security identity verification

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bojan Simic is the CEO of HYPR.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • laptop with password login screen

    Security culture is only as strong as the weakest link

    See More
  • Cybersecurity Leadership Images

    Report: CEOs the Weakest Link with Security Measures

    See More
  • Fraud spelled in blocks

    1 in 20 Financial Service Online Identity Verification Attempts Is Fraudulent

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing