Follow Us

Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Artificial Intelligence Cybersecurity

Are You For Real? Dealing with the Proliferation of Deepfakes

Notwithstanding the significant threats facing companies as a result of deepfake technology, there are several things companies can do to protect themselves and their employees from becoming the victim of a deepfake scam.

X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.

Imagine a scenario: It’s already been a long week, but on Thursday night you receive an invite from your company’s CFO asking for an early morning videoconference the next day. While this is an unexpected meeting, your company has been doing more and more meetings over video. On Friday morning you wake up and log on to the videoconference. You recognize everyone in attendance: your CFO and colleagues from your tax and accounts payable departments. The CFO instructs you to send several wires to pay vendor invoices arising from the company’s recent retreat. While you find the request a bit strange, you comply because, after all, it is the CFO giving the instructions. You feel more comfortable because your tax colleague confirmed receipt of a W-9 for each vendor, and your accounts payable colleague provided the wire information. Several weeks later, you find out that the CFO never requested the video conference, neither of your colleagues have any recollection of attending such a meeting, and the wires you sent were never authorized.

This premium content is locked for Cybersecurity Law & Strategy subscribers only

Continue reading by getting
started with a subscription.

ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN CYBERSECURITY, PRIVACY, INFORMATION GOVERNANCE, LEGAL TECHNOLOGY AND E-DISCOVERY.
  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on cyber threats, data breaches, and legal technology
  • Tap into expert guidance from top legal tech lawyers and experts

SUBSCRIBE NOW

Subscribe Now For Unlimited Access

Read These Next