Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity & Business ResilienceSecurity Education & TrainingCyber Case Studies

Disinformation: Companies in the crosshairs

By James Blake
The risk of a disinformation attack against an enterprise or large organization is increasingly serious and needs to be included in companies’ risk preparedness contingency planning.
January 12, 2021

In late August 2020, a doctored video emerged of now President-elect Joe Biden apparently falling asleep during a TV interview. The video was then shared by the Trump administration’s White House Deputy Chief of Staff for Communications, Dan Scavino, and The Wayne Dupree Show C-host Brian Smyth. 

It subsequently emerged that the video was not Joe Biden, but that his image had been inserted over singer Harry Belafonte who was asleep waiting for an interview on TV. The video however had reached hundreds of thousands of viewers before Twitter labeled it as “manipulated media” and added to the narrative of “sleepy Joe.”

It is not a stretch in the current information environment to think of a scenario in which a CEO or board member of a large multinational company suffers a similar deep-fake incident. The impact from these kinds of incidents could send a company’s share price plummeting.

The risk of a disinformation attack against an enterprise or large organization is increasingly serious and needs to be included in companies’ risk preparedness contingency planning.

Identifying terms

In 2018, Now8news reported a false story that Coca-Cola’s Dasani brand was contaminated with parasites and the Food and Drug Administration had accordingly shut down its manufacturing facility.

The story prompted a swift reply by Coca-Cola which stated the story was “false and inflammatory information on a hoax news website.”

Given information operations is a relatively new area, there remains some confusion about the difference between mis- and dis-information. The two can broadly be defined as:

Misinformation: the sharing of information that is inaccurate.

Disinformation: the sharing of information that is deliberately inaccurate to spread a false narrative.

In the case of Coca-Cola an accurate categorization would require knowledge on how the news outlet sourced the article and its motivation in publishing the piece.  In the event that the article was published for nefarious purposes, this would be a disinformation operation.

Assessing the disinformation threat environment

The rapid spread of social media as a provider of news – and the lack of fact-checking – has enabled nefarious actors to weaponize information for their own ends – and potentially with serious consequences for companies’ brands, reputations and security.

The basis and know-how for disinformation campaigns are now relatively well-known and typically involve one or more of the following tactics: brigading,​ ​sock puppets,​ ​deep fakes​,​ ​botnets​, and​ ​content farms​.

The risk and impact of a disinformation operation will depend on the actor and incident. But the issue is particularly troublesome because it can be staged without expanding significant resources and with limited technical skills.

Threat actor: Nation states

Nation states such as China and Russia could conceivably conduct information operations against multinational companies with the aim of damaging their reputation or to lower a targeted company’s share prices.

The capability of nation states to launch disinformation operations such as Russia is significant. In Russia media outlets such as Russia Today often reflect the government’s aims and is a potential outlet for disinformation. The government is also reportedly connected to the Internet Research Agency which has conducted strategic targeted internet troll campaigns.

A coordinated and carefully executed disinformation campaign by a capable actor could have potentially devastating consequences for a company, even in the event of quick and coordinated response by a targeted organization.

A worrying example emerged in January 2019 when a video purportedly showing a Tesla “self-driving vehicle” hit into a robot prototype at an electronic show. The video soon went viral and led to damaging headlines such as “self-driving Tesla kills robot.”

But it soon emerged that the video was a fake and was in fact made by a Russian company which had made the video as a fake as a publicity stunt.

In the coming months it is becoming increasingly likely that a national government or activist group – perhaps involved in a trade dispute or other geopolitical issue – will respond by launching a disinformation campaign against a large multinational company to destroy or damage its reputation.

Threat actor: Business competitors

A more likely scenario for many companies is that is business competitors would coordinate and direct operations to damage its reputation. The impact of such a campaign would be more significant given that information can spread so quickly.

It is certainly not a stretch to imagine rival companies promoting fake news about a competitor whether it is a reported misdeed of a CEO, designing a cheap fake photo of a board member in a compromising situation, or spreading falsehoods’ about an organization’s financial performance.

Such stories could quickly spread into a company’s client base or shareholders and cause significant ramifications.

Meanwhile, Giorgio Patrini the CEO of Deeptrace Labs, has warned over the past year that his firm is aware of the real time use of deepfakes by webcam, which could enable competitors to attend confidential meetings and then distribute variations of the content online.

Threat actor: Disgruntled former employees

Disgruntled employees also increasingly have an avenue to retaliate against their former companies online and cause damage.

A strategic Glassdoor post which is then shared through various social media platforms can have an impact on a company’s reputation and its ability to recruit new employees within competitive industries. Other variations could include a former employee publishing a tell all but factually inaccurate op-ed on LinkedIn or social media post which distorts internal issues such as the treatment of women and minorities.

An ounce of prevention equals a pound of cure

Preparing for a disinformation campaign must follow the planning to manage other strategic risks.

The issue is often more of a challenge for companies with uncertainty around where managing and responding to disinformation campaigns fits in the organizational chart, given that is straddles reputation, physical and cyber issues.

But an important step is for a company to identify its own risk profile and how likely it might experience a disinformation operation.

For instance, a company that is attached to controversial or high-profile political issues, has high-profile employees, or is involved in issues such as climate change, supplying weapons, or involved in actively supporting a presidential candidate, your risk of experiencing a disinformation attack is higher.

Subsequently, companies – like governments – will benefit from red-teaming scenarios of how disinformation campaigns could impact them and how they should respond.

This would likely entail preparing detailed plans of who would manage an incident, which senior executives would be involved in responding and some prepared contacts with media organizations, and messaging to shareholders, employees and externally to news outlets.

Ultimately as the 2020 presidential election campaign has shown, the likelihood of information campaigns is only likely to become more pervasive in the months and years to come. Given the lack of regulation of social media companies, a range of actors will adopt various disinformation tactics to harm businesses.

KEYWORDS: deepfakes enterprise enterprise security misinformation campaigns

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Linkedin

James M. Blake has worked in corporate security, emergency risk management and conflict risk analysis for over 10 years. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Disinformation and misinformation pose a threat risk for risk managers and all enterprises

    Disinformation is changing security risk management

    See More
  • SEC1119-AI1-Feat-slide_900px

    Disinformation in 5.4 Billion Fake Accounts: A Lesson for the Private Sector

    See More
  • Reimagine the corporate security team

    Reimagine the corporate security structure

    See More

Events

View AllSubmit An Event
  • April 23, 2025

    Employee Perceptions of Workplace Safety in 2025

    ON DEMAND: Workplace safety continues to be a critical concern in 2025, with employees across industries expressing growing concerns about their safety at work.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing