Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business ResilienceSecurity Education & Training

Will deepfake threats undermine cybersecurity in 2025?

By Gil Friedrich
Blurry face

Darius Bashar via Unsplash

February 12, 2025

Deepfake technology is a new and unsettling reality. When embedded within phishing emails and collaboration chats, deepfakes represent a vicious and growing threat. To combat deepfakes, organizations urgently need to implement fresh approaches to both employee education and cybersecurity.

To convey the gravitas of the situation, in February of 2024, a Singapore-based company lost $25 million due to deepfake impersonation of the firm’s CFO and other high-level executives. An employee mistakenly believed the deepfake ruse and sent funds to an illegitimate account.  

Similarly, in the second half of 2024, a North Korean deepfake threat actor convinced KnowBe4, the cybersecurity company, to hire him. That’s correct — a deepfake fooled a cybersecurity company. 

The aforementioned examples point to threat actors deliberate and effective attempts to dupe employees and to infiltrate global organizations with ties to the supply chain. Motives range from financial gain to espionage.

Addressing responsibility 

One of the key issues in combating deepfake threats is that we’re still missing some of the cybersecurity protective technologies. It has not yet been determined as to which security provider, and which mechanisms are responsible for protection. Is it the endpoint security? Is it the telecommunications platform?

The ambiguity means that organizations need to be proactive about deepfake prevention, initially focusing on employee awareness and employee training. Organizations should also ensure that they deploy best-in-class technologies for their cybersecurity stack — from email, to endpoint, to mobile security — to block attackers from infiltrating and then impersonating both employees and business partners. As I mentioned in my 2025 cyber predictions, hackers won’t just steal your data or your access credentials, they’ll disrupt financial transactions, corporate decisions, and brand reputation. 

For example, if the attackers’ send a meeting bridge via email, advanced email security is likely to identify a potential impersonation attempt, and can block the email before it even reaches the employee.

Mastering the mind

As a society, by-and-large, we are used to trusting what we see with our eyes and what we hear with our ears. Many people continue to trust rich media; video and audio. However, with deepfake technologies all of that can be faked. Thus, we need to tell our employees to be more suspicious and to provide our employees with new heuristics with which to assess input. 

Several years ago, when text message scams ramped up and began to impersonate commonly used services, like UPS, FedEx or the bank, we learned to avoid trusting text messages. We will need to do the same with video and audio in order to prevent the hijacking of our perceptions. 

Within organizations, in relation to cybersecurity training, teach employees to think in terms of “zero trust”. Encourage employees to suspect and question everything that they see. 

It is imperative that we train employees to implement a mental two-factor authentication, where they verify any request through a trusted and independent channel — one that a hacker is unlikely to compromise.

Furthermore, employees need to consider what they are being asked to do and how they can verify that it is genuine. It could be as simple as a phone call to the person after taking their number from a separate and verified source.

Comprehensive and advanced

Organizations not only need comprehensive cybersecurity, as mentioned previously, but also need advanced technology to prevent deceptive threats. 

For example, AI-based stylometry can detect attacks that would bypass human observation. Attacks may involve email or documents that look ordinary, but that are actually inauthentic. A person wouldn’t be able to distinguish the fake from the real, but a software solution would.

More information

Experts anticipate that, over time, communication platforms will improve their security, as to be able to detect and block deepfakes. I foresee, that in a year or two, we’ll see more of these technologies embedded into the telecommunication platforms.

Further, communications platforms will likely increase their capacities to confirm real identities while blocking impersonators. That said, additional security from cybersecurity vendors will prove critical, as historically, default security hasn’t stopped sophisticated and targeted attacks. 

A deep-dive into DLP

Over the last decade, we’ve seen an increase in DLP technology adoption, especially when it comes to monitoring sensitive content in cloud-based repositories. According to Statista’s projection, the DLP market will experience almost a 65% increase, growing from $1.24 billion in 2019 to $3.5 billion by 2025. 

However, implementing DLP inside live conversations is still a challenge. Additionally, it’s not clear as to what the value and experience would be. It has yet to be seen as to whether enterprise customers will look to expand DLP capabilities into live conversations. 

Nonetheless, this may represent a strategic approach that can protect employees from sharing sensitive content, should they fall victim to a deepfake scam.

Further thoughts

As deepfake technology continues to advance, organizations not only need to track trends, but also need to stay flexible and adaptable in relation to cybersecurity strategies. 

By focusing on a combination of employee training, comprehensive security measures and agile security tooling, businesses will be better able to protect themselves from sophisticated AI and deepfake threats. 

KEYWORDS: artificial intelligence (AI) deepfakes employee training security responsibilities

Share This Story

Gil friedrich headshot

Gil Friedrich is the VP of Email Security at Check Point. Image courtesy of Friedrich 

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!