Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity & Business ResilienceSecurity Education & TrainingCyber Case Studies

Disinformation: Companies in the crosshairs

By James Blake
The risk of a disinformation attack against an enterprise or large organization is increasingly serious and needs to be included in companies’ risk preparedness contingency planning.
January 12, 2021

In late August 2020, a doctored video emerged of now President-elect Joe Biden apparently falling asleep during a TV interview. The video was then shared by the Trump administration’s White House Deputy Chief of Staff for Communications, Dan Scavino, and The Wayne Dupree Show C-host Brian Smyth. 

It subsequently emerged that the video was not Joe Biden, but that his image had been inserted over singer Harry Belafonte who was asleep waiting for an interview on TV. The video however had reached hundreds of thousands of viewers before Twitter labeled it as “manipulated media” and added to the narrative of “sleepy Joe.”

It is not a stretch in the current information environment to think of a scenario in which a CEO or board member of a large multinational company suffers a similar deep-fake incident. The impact from these kinds of incidents could send a company’s share price plummeting.

The risk of a disinformation attack against an enterprise or large organization is increasingly serious and needs to be included in companies’ risk preparedness contingency planning.

Identifying terms

In 2018, Now8news reported a false story that Coca-Cola’s Dasani brand was contaminated with parasites and the Food and Drug Administration had accordingly shut down its manufacturing facility.

The story prompted a swift reply by Coca-Cola which stated the story was “false and inflammatory information on a hoax news website.”

Given information operations is a relatively new area, there remains some confusion about the difference between mis- and dis-information. The two can broadly be defined as:

Misinformation: the sharing of information that is inaccurate.

Disinformation: the sharing of information that is deliberately inaccurate to spread a false narrative.

In the case of Coca-Cola an accurate categorization would require knowledge on how the news outlet sourced the article and its motivation in publishing the piece.  In the event that the article was published for nefarious purposes, this would be a disinformation operation.

Assessing the disinformation threat environment

The rapid spread of social media as a provider of news – and the lack of fact-checking – has enabled nefarious actors to weaponize information for their own ends – and potentially with serious consequences for companies’ brands, reputations and security.

The basis and know-how for disinformation campaigns are now relatively well-known and typically involve one or more of the following tactics: brigading,​ ​sock puppets,​ ​deep fakes​,​ ​botnets​, and​ ​content farms​.

The risk and impact of a disinformation operation will depend on the actor and incident. But the issue is particularly troublesome because it can be staged without expanding significant resources and with limited technical skills.

Threat actor: Nation states

Nation states such as China and Russia could conceivably conduct information operations against multinational companies with the aim of damaging their reputation or to lower a targeted company’s share prices.

The capability of nation states to launch disinformation operations such as Russia is significant. In Russia media outlets such as Russia Today often reflect the government’s aims and is a potential outlet for disinformation. The government is also reportedly connected to the Internet Research Agency which has conducted strategic targeted internet troll campaigns.

A coordinated and carefully executed disinformation campaign by a capable actor could have potentially devastating consequences for a company, even in the event of quick and coordinated response by a targeted organization.

A worrying example emerged in January 2019 when a video purportedly showing a Tesla “self-driving vehicle” hit into a robot prototype at an electronic show. The video soon went viral and led to damaging headlines such as “self-driving Tesla kills robot.”

But it soon emerged that the video was a fake and was in fact made by a Russian company which had made the video as a fake as a publicity stunt.

In the coming months it is becoming increasingly likely that a national government or activist group – perhaps involved in a trade dispute or other geopolitical issue – will respond by launching a disinformation campaign against a large multinational company to destroy or damage its reputation.

Threat actor: Business competitors

A more likely scenario for many companies is that is business competitors would coordinate and direct operations to damage its reputation. The impact of such a campaign would be more significant given that information can spread so quickly.

It is certainly not a stretch to imagine rival companies promoting fake news about a competitor whether it is a reported misdeed of a CEO, designing a cheap fake photo of a board member in a compromising situation, or spreading falsehoods’ about an organization’s financial performance.

Such stories could quickly spread into a company’s client base or shareholders and cause significant ramifications.

Meanwhile, Giorgio Patrini the CEO of Deeptrace Labs, has warned over the past year that his firm is aware of the real time use of deepfakes by webcam, which could enable competitors to attend confidential meetings and then distribute variations of the content online.

Threat actor: Disgruntled former employees

Disgruntled employees also increasingly have an avenue to retaliate against their former companies online and cause damage.

A strategic Glassdoor post which is then shared through various social media platforms can have an impact on a company’s reputation and its ability to recruit new employees within competitive industries. Other variations could include a former employee publishing a tell all but factually inaccurate op-ed on LinkedIn or social media post which distorts internal issues such as the treatment of women and minorities.

An ounce of prevention equals a pound of cure

Preparing for a disinformation campaign must follow the planning to manage other strategic risks.

The issue is often more of a challenge for companies with uncertainty around where managing and responding to disinformation campaigns fits in the organizational chart, given that is straddles reputation, physical and cyber issues.

But an important step is for a company to identify its own risk profile and how likely it might experience a disinformation operation.

For instance, a company that is attached to controversial or high-profile political issues, has high-profile employees, or is involved in issues such as climate change, supplying weapons, or involved in actively supporting a presidential candidate, your risk of experiencing a disinformation attack is higher.

Subsequently, companies – like governments – will benefit from red-teaming scenarios of how disinformation campaigns could impact them and how they should respond.

This would likely entail preparing detailed plans of who would manage an incident, which senior executives would be involved in responding and some prepared contacts with media organizations, and messaging to shareholders, employees and externally to news outlets.

Ultimately as the 2020 presidential election campaign has shown, the likelihood of information campaigns is only likely to become more pervasive in the months and years to come. Given the lack of regulation of social media companies, a range of actors will adopt various disinformation tactics to harm businesses.

KEYWORDS: deepfakes enterprise enterprise security misinformation campaigns

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Linkedin

James M. Blake has worked in corporate security, emergency risk management and conflict risk analysis for over 10 years. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Disinformation and misinformation pose a threat risk for risk managers and all enterprises

    Disinformation is changing security risk management

    See More
  • SEC1119-AI1-Feat-slide_900px

    Disinformation in 5.4 Billion Fake Accounts: A Lesson for the Private Sector

    See More
  • ransom-enews

    Financial Services in the Ransomware Crosshairs: Why and What to Do

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • Risk Analysis and the Security Survey, 4th Edition

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    ON DEMAND: What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing