---
description: Biometric fraud and deepfakes are the latest evolution of AI cyberattacks that threaten businesses. GetApp finds out how Australian firms are responding.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/getapp/og_logo-94fd2a03a6c7a0e54fc0c9e21a1c0ce9.png
title: Deepfake response plans against AI cyberattacks to maintain cybersecurity
---

# AI cyberattacks push 66% Aussie companies to have a deepfake response plan

Canonical: https://www.getapp.com.au/blog/6892/deepfake-response-plan-ai-cyberattacks

Published on 15/09/2024 | Written by Andrew Blair.

![AI cyberattacks push 66% Aussie companies to have a deepfake response plan](https://images.ctfassets.net/63bmaubptoky/1jNosJObT50xIkY3iFAXUx/3ecf1b1a4f4e674bb2da64b3b8aa0ffb/cybersecurity-measures-business-CA-GetApp-HEADER.png)

> Aussie companies are already preparing for the most recent evolution of biometric cyberattacks—deepfake impersonations and ID fraud—in their fight against cybercriminals. What more can companies do to increase security?

-----

## Article Content

Aussie companies are already preparing for the most recent evolution of biometric cyberattacks—deepfake impersonations and ID fraud—in their fight against cybercriminals. What more can companies do to increase security?In this articlePrivacy concerns are a challenge for businesses using biometric authentication despite satisfactory resultsAustralian IT professionals brace themselves with a deepfake response plan7 low-cost ways Australian companies can increase their cybersecurity effortsPreparation is essential to combat biometric fraudDeepfakes and artificial intelligence (AI) - generated identity fraud represent a looming threat to Australian companies, with many already suffering the impacts of increasingly sophisticated impersonation attacks. These attacks can disrupt unique, established protection methods like biometrics, which were previously considered impractical or impossible to replicate.What is the definition of a deepfake?A deepfake is a form of fraud in which cybercriminals use machine learning and deep learning processes to create artificial images, videos, and vocal audio to realistically impersonate an individual. \[1\]This newer breed of cyberattacks can undermine direct communications with a person via phone or video chat, and has already helped hackers trick people out of millions. Company leaders need reassurance that their protections can still work to defend them against threats. Given the urgency of this issue, what are companies doing to adapt to the new realities?To find out, in GetApp’s Executive Cybersecurity Survey\*, we surveyed 2,648 IT and cybersecurity professionals globally in May 2024, including 241 Australian respondents. We examined how the rise of new AI-driven impersonation attacks is causing companies to reevaluate their cybersecurity and network monitoring protections. Key insights51% of Australian IT and cybersecurity professionals have privacy concerns and 46% fear potential identity theft from implementing or using biometric protections.97% of Australian IT and cybersecurity professionals are satisfied with biometric authentication results.66% of Australian IT and security professionals say their companies have developed specific measures to defend against AI-generated deepfake attacks.88% of surveyed professionals work in companies that have increased their investments in cybersecurity over the last 18 months.Privacy concerns are a challenge for businesses using biometric authentication despite satisfactory resultsBiometrics have commonly been adopted to protect access to company systems and remain common in Australian businesses. Nearly two-thirds (64%) of Australian respondents work in companies where employers require the use of biometric authentication to tighten cybersecurity (above the global average of 53%).Besides employers, biometric authentication methods are proving satisfactory to various other users. Overall, 97% of Australian respondents who use biometric authentication are either satisfied or extremely satisfied with the results. Despite being vulnerable to cyberattacks, they can still make up part of a strong defensive strategy, especially as a step of multi-factor authentication (MFA). Having multiple steps of secure authentication still remains a strong tactic for thwarting potential cybersecurity breaches.Based on our survey, just over half (51%) of Aussie respondents identify high privacy concerns as their biggest challenge when using biometric protections above other potential issues such as identity theft and data breaches.To top it all off, trust is now coming under threat from another source. With an increase in AI-generated attacks, including deepfake fraud, targeted phishing attacks, malware, and impersonations, Australian businesses are concerned about using biometrics. Out of all countries surveyed, Australians had the highest number of respondents (80%) in companies with biometrics measures worrying about AI’s potential to create synthetic fingerprints, facial images, or voices for ID fraud.The pros and cons of biometrics for user securityVaried biometric login methods can enhance or weaken the protective capacity of a business. While it's easier for bad actors to spoof more recognisable biometric features, businesses can ensure robust protection by leveraging biometrics as just one part of the identification process instead of making it the only mode of authentication.Adding an extra step of security verification can make all the difference. Businesses offering optional use of single-factor access sign-on can make it easier for hackers to breach a company's defences. Hackers responsible for the recent breaches affecting the data of 500 million Ticketmaster users took advantage of this by targeting specific users of one of the company’s cloud providers who had not enforced multi-step authentication access across the board. \[2\]Therefore, businesses should ensure employees require multiple factors to identify themselves and do not have biometric authentication as an opt-in only.Australian IT professionals brace themselves with a deepfake response plan Deepfake content and live videos present a worrying problem for company executives. These impersonation attacks allow cybercriminals to access sensitive information or make fraudulent transactions by using the visual appearance of a trusted employee or a company leader. In fact, the threat and fear of these attacks have already generated action. We found that 66% of Aussie IT professionals work in organisations where cybersecurity or IT management teams have developed specific measures against the risks of AI-generated deepfakes and their potential to impersonate senior executives. Companies can respond to the dangers of deepfakes in various ways, using training and software solutions in tandem. Simulation exercises can help organisations identify risks, enhance training by providing hands-on experience, and can help validate a response plan. Australian companies must put more emphasis on these to increase their preparedness for a cybersecurity attack as they fall behind the global average.Awareness and practice of encountering deepfake attacks are both important to prepare the workforce to deal with these evolving threats. These approaches combine both theoretical awareness and a practical element to help employees spot the dangers and keep on their toes when a real attack comes along.How organisations can identify a deepfakeAs deepfaking executives and employees on video calls become more prevalent, it is important to be aware of the signs to look out for to know if something is up. Some common features of deepfake videos include:Jerky or unnatural body movement Blurring around facial featuresUnnatural eye-movementsUnusual colourationInconsistent audioAdditionally, if you are in doubt about the person you are speaking to, you can make it easier to spot deepfakes by asking them to turn their head 90° to the side to see a profile view of their face. This can disrupt the software algorithm that projects another face onto the speaker as it has to adapt to a shape it is not as used to working with.7 low-cost ways Australian companies can increase their cybersecurity effortsAs the risks in the current security landscape are urgent, reallocating or raising spending on cyber defence is a major question small businesses are facing.Unsurprisingly, our study shows that spending has been on the rise. Amongst our sample, 88% of Australian respondents report that their company’s cybersecurity spending has grown over the last 18 months, far above the global average of 77%.However, as we can see, higher expenditure isn’t the only solution available to companies. There are also relatively straightforward, cost-effective optimisations that companies can implement to improve their defences. Here, we list seven measures firms can deploy:1. Formulate a strategy for managing deepfakes Companies should prioritise a strategy for tackling deepfake attacks. This strategy could incorporate a two-pronged approach: raising awareness of the dangers and simulating the kinds of attacks staff may encounter, which might be crucial when a real threat arises.Additionally, when addressing the threat of deepfake phishing, it is worth considering using a deepfake detection tool as an extra layer of security. These can monitor video calls and messages to scan for telltale signs of a fake image or appearance and notify users accordingly. 2. Conduct a network security auditWhere senior executives are being targeted, it is vital to review your company's network security for any vulnerabilities that could easily allow a cyberattack to succeed. We found that 48% of our sample whose senior executives were targeted by cyberattackers are prioritising improvements to their network security and this is key to underpinning security.Network security software should be standard in every company. It protects against cyberattacks and data loss by detecting and blocking threats such as viruses, malware, and unauthorised access. It also improves network integrity and availability, resulting in a more stable and secure IT infrastructure. 3. Prepare executives for emerging realitiesExecutives are a prize target for scammers or threat actors due to their levels of access and oversight over major transactions and decisions in a company. New threats such as deepfakes require extra commitment to this goal.Security awareness training software can prove practical for executives and other staff, offering up-to-date guidance on how to spot and respond to the latest threats.4. Secure your data with encryption Unprotected data is a goldmine for cybercriminals and can be used to socially engineer a cyberattack on your business. Therefore, it is especially essential to ensure business data is stored and shared securely.Having a strong data encryption solution is key. This makes the data harder to access and interpret without the right authorisation. So, even if a hacker gets away with information, they may not be able to use it.  5. Enforce routine update schedulesThe latest updates usually prioritise security patches to prevent vulnerabilities from being exploited. According to our sample, software updates are a priority for 45% of previously targeted companies, representing a small but significant step toward better security.A good trick here is to use patch management software across a business to ensure updates, drivers, and firmware are kept up to date as new patches are released. This tool can monitor software for upgraded versions and enforce compliance with update schedules.6. Implement multi-layered protectionAs we’ve seen, it’s important to ensure multiple levels of cybersecurity protection to enhance cybersecurity as newer forms of biometric authentication are on the rise. This is integral to preventing attacks from succeeding and making the process of breaching your defences more complicated for an attacker.Having a strong multi-factor authentication (MFA) system in place can also help alleviate emerging concerns about the safety of authentication software and biometric security and create better confidence in cybersafety. When doing so, it can help to look out for software providers who offer features such as enhanced fraud detection and low-code integrations. 7. Enhance your password policyA good password policy is a company-wide concern. This is an ever-more-important issue to ensure each step of security is up to the challenge of today’s technical landscape, especially as trust in biometrics drops. Moreover, a strong password policy is only going to get more vital as AI tools emerge that can crack passwords with greater ease. \[3\]The use of self-service password reset (SSPR) tools can prove vital in this regard. They can help ensure staff regularly update their passwords and set parameters for the level of complexity a password must have.Preparation is essential to combat biometric fraudThe threat posed by biometric fraud and deepfake technology is a serious cause for concern for companies. However, the good news is that steps can be taken to get ahead of cybercriminals. In many ways, the fear of these threats has galvanised companies to examine their security provisions more closely and make improvements. This helps defend against not only newer threats but also more established dangers. Looking forward, it is likely that newer threats to trusted security measures like biometrics will grow as techniques for sidestepping them evolve, but being forewarned is being forearmed. As we observed in our data, companies are responding to this challenge by spreading internal awareness, and staying on top of this will be important as a first line of defence.This preparedness also needs to go beyond a one-size-fits-all approach. Company executives represent a major target for cybercriminals and this requires some special measures as we observe in part two of this survey analysis.Looking for cybersecurity software? Check out our catalogue.

## Disclaimer

> Survey methodology\*GetApp's Executive Cybersecurity Survey was conducted in May 2024 among 2,648 respondents in the U.S. (n=238), Canada (n=235), Brazil (n=246), Mexico (n=238), the U.K. (n=254), France (n=235), Italy (n=233), Germany (n=243), Spain (n=243), Australia (n=241), and Japan (n=242). The goal of the study was to explore how IT and cybersecurity professionals are responding to the rising threat of biometric fraud. Respondents were screened for IT and cybersecurity roles at companies that use security software and have more than one employee. Respondents were screened for involvement in, or full awareness of, cybersecurity measures implemented at their company.SourcesDeep Learning definition, GartnerTicketmaster confirms hack which could affect 560m, BBCAI can steal passwords by listening to your keyboard, Information Age

## About the author

### Andrew Blair

Andrew is a Content Analyst for GetApp, giving SMEs insights into tech, software and business trends. Interest in entrepreneurship, furthering projects and startups. 

## Related Categories

- [Artificial Intelligence (AI) Software](https://www.getapp.com.au/directory/1397/artificial-intelligence/software)
- [Cloud Security Software](https://www.getapp.com.au/directory/291/cloud-security/software)
- [IT, Server and Network Monitoring Tools](https://www.getapp.com.au/directory/652/it-server-network-monitoring/software)
- [Network Monitoring Tools](https://www.getapp.com.au/directory/480/network-monitoring/software)
- [Network Security Software](https://www.getapp.com.au/directory/1443/network-security/software)

## Related Articles

- [Automation: A quarter of SME employees think there will be a lack of job prospects in the future](https://www.getapp.com.au/blog/2576/future-of-automation-and-digital-skills-in-australia)
- [Data security processes: What do Australians expect from organisations?](https://www.getapp.com.au/blog/3663/data-security-australia)
- [Australia ahead of global average in data breaches: Four ways to combat top cyberthreats in 2025](https://www.getapp.com.au/blog/7539/advanced-phishing-attacks-top-worry-it-professionals)
- [Office space study: To cowork or not to cowork?](https://www.getapp.com.au/blog/4375/shared-and-private-workspaces-research)
- [Research: How are Aussie companies preparing for global supply chain disruptions in 2024?](https://www.getapp.com.au/blog/6117/supply-chain-disruptions-2024)

## Links

- [View on GetApp](https://www.getapp.com.au/blog/6892/deepfake-response-plan-ai-cyberattacks)
- [Blog](https://www.getapp.com.au/blog)
- [Home](https://www.getapp.com.au/)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"GetApp Australia","address":{"@type":"PostalAddress","addressLocality":"Sydney","addressRegion":"NSW","postalCode":"2060","streetAddress":"Level 18 40 Mount Street North Sydney NSW 2060 Australia"},"description":"Review, Compare and Evaluate small business software. GetApp Australia has software offers, SaaS and Cloud Apps, independent evaluations and reviews.","email":"info@getapp.com.au","url":"https://www.getapp.com.au/","logo":"https://dm-localsites-assets-prod.imgix.net/images/getapp/getapp-logo-light-mode-5f7ee07199c9b3b045bc654a55a2b9fa.svg","@id":"https://www.getapp.com.au/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/getapp","https://www.facebook.com/GetAppcom","https://www.linkedin.com/company/getapp-com-a-gartner-company/","https://www.instagram.com/getappcom/","https://www.youtube.com/c/GetAppCom"]},{"name":"GetApp Australia","url":"https://www.getapp.com.au/","@id":"https://www.getapp.com.au/#website","@type":"WebSite","publisher":{"@id":"https://www.getapp.com.au/#organization"},"potentialAction":{"query":"required","target":"https://www.getapp.com.au/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Deepfake response plans against AI cyberattacks to maintain cybersecurity","description":"Biometric fraud and deepfakes are the latest evolution of AI cyberattacks that threaten businesses. GetApp finds out how Australian firms are responding.","url":"https://www.getapp.com.au/blog/6892/deepfake-response-plan-ai-cyberattacks","about":{"@id":"https://www.getapp.com.au/#organization"},"@id":"https://www.getapp.com.au/blog/6892/deepfake-response-plan-ai-cyberattacks#webpage","@type":"WebPage","isPartOf":{"@id":"https://www.getapp.com.au/#website"}},{"description":"Aussie companies are already preparing for the most recent evolution of biometric cyberattacks—deepfake impersonations and ID fraud—in their fight against cybercriminals. What more can companies do to increase security?","author":[{"name":"Andrew Blair","@type":"Person"}],"image":{"url":"https://images.ctfassets.net/63bmaubptoky/1jNosJObT50xIkY3iFAXUx/3ecf1b1a4f4e674bb2da64b3b8aa0ffb/cybersecurity-measures-business-CA-GetApp-HEADER.png","@id":"https://www.getapp.com.au/blog/6892/deepfake-response-plan-ai-cyberattacks#primaryimage","@type":"ImageObject"},"@type":"BlogPosting","articleBody":"&lt;p&gt;&lt;b&gt;Aussie companies are already preparing for the most recent evolution of biometric cyberattacks—deepfake impersonations and ID fraud—in their fight against cybercriminals. What more can companies do to increase security?&lt;/b&gt;&lt;/p&gt;&lt;img title=&quot;cybersecurity-measures-business-AU-GetApp-HEADER&quot; alt=&quot;Cybercriminals employ AI tech to try hack biometric login information on a smartphone&quot; class=&quot;aligncenter&quot; fetchpriority=&quot;high&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/1jNosJObT50xIkY3iFAXUx/3ecf1b1a4f4e674bb2da64b3b8aa0ffb/cybersecurity-measures-business-CA-GetApp-HEADER.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/1jNosJObT50xIkY3iFAXUx/3ecf1b1a4f4e674bb2da64b3b8aa0ffb/cybersecurity-measures-business-CA-GetApp-HEADER.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/1jNosJObT50xIkY3iFAXUx/3ecf1b1a4f4e674bb2da64b3b8aa0ffb/cybersecurity-measures-business-CA-GetApp-HEADER.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/1jNosJObT50xIkY3iFAXUx/3ecf1b1a4f4e674bb2da64b3b8aa0ffb/cybersecurity-measures-business-CA-GetApp-HEADER.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/1jNosJObT50xIkY3iFAXUx/3ecf1b1a4f4e674bb2da64b3b8aa0ffb/cybersecurity-measures-business-CA-GetApp-HEADER.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/1jNosJObT50xIkY3iFAXUx/3ecf1b1a4f4e674bb2da64b3b8aa0ffb/cybersecurity-measures-business-CA-GetApp-HEADER.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;div class=&quot;table-of-contents&quot;&gt;&lt;h2 class=&quot;h3&quot;&gt;In this article&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;#Privacy-concerns-are-a-challenge-for-businesses-using-biometric-authentication-despite-satisfactory-results&quot; class=&quot;event&quot; data-evna=&quot;engagement_facet_click&quot; data-evcmp=&quot;table-of-contents&quot; data-evdst=&quot;jump-to_section&quot; data-evdtl=&quot;text-link_section-name&quot;&gt;Privacy concerns are a challenge for businesses using biometric authentication despite satisfactory results&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#Australian-IT-professionals-brace-themselves-with-a-deepfake-response-plan&quot; class=&quot;event&quot; data-evna=&quot;engagement_facet_click&quot; data-evcmp=&quot;table-of-contents&quot; data-evdst=&quot;jump-to_section&quot; data-evdtl=&quot;text-link_section-name&quot;&gt;Australian IT professionals brace themselves with a deepfake response plan&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#7-low-cost-ways-Australian-companies-can-increase-their-cybersecurity-efforts&quot; class=&quot;event&quot; data-evna=&quot;engagement_facet_click&quot; data-evcmp=&quot;table-of-contents&quot; data-evdst=&quot;jump-to_section&quot; data-evdtl=&quot;text-link_section-name&quot;&gt;7 low-cost ways Australian companies can increase their cybersecurity efforts&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#Preparation-is-essential-to-combat-biometric-fraud&quot; class=&quot;event&quot; data-evna=&quot;engagement_facet_click&quot; data-evcmp=&quot;table-of-contents&quot; data-evdst=&quot;jump-to_section&quot; data-evdtl=&quot;text-link_section-name&quot;&gt;Preparation is essential to combat biometric fraud&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;Deepfakes and artificial intelligence (AI) - generated identity fraud represent a looming threat to Australian companies, with many already suffering the impacts of increasingly sophisticated impersonation attacks. These attacks can disrupt unique, established protection methods like biometrics, which were previously considered impractical or impossible to replicate.&lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;What is the definition of a deepfake?&lt;/div&gt;A deepfake is a form of fraud in which cybercriminals use machine learning and deep learning processes to create artificial images, videos, and vocal audio to realistically impersonate an individual. [1]&lt;/div&gt;&lt;p&gt;This newer breed of cyberattacks can undermine direct communications with a person via phone or video chat, and has already helped hackers trick people out of millions. Company leaders need reassurance that their protections can still work to defend them against threats. Given the urgency of this issue, what are companies doing to adapt to the new realities?&lt;/p&gt;&lt;p&gt;To find out, in GetApp’s Executive Cybersecurity Survey*, we surveyed 2,648 IT and cybersecurity professionals globally in May 2024, including 241 Australian respondents. We examined how the rise of new AI-driven impersonation attacks is causing companies to reevaluate their &lt;a href=&quot;/directory/1035/cybersecurity/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;cybersecurity&lt;/a&gt; and &lt;a href=&quot;/directory/480/network-monitoring/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;network monitoring&lt;/a&gt; protections. &lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;&lt;svg viewbox=&quot;0 0 26 28&quot; aria-hidden=&quot;true&quot; class=&quot;icon icon-star box-header__icon align-middle mb-1 me-2&quot;&gt;&lt;path d=&quot;M26 10.109c0 0.281-0.203 0.547-0.406 0.75l-5.672 5.531 1.344 7.812c0.016 0.109 0.016 0.203 0.016 0.313 0 0.406-0.187 0.781-0.641 0.781-0.219 0-0.438-0.078-0.625-0.187l-7.016-3.687-7.016 3.687c-0.203 0.109-0.406 0.187-0.625 0.187-0.453 0-0.656-0.375-0.656-0.781 0-0.109 0.016-0.203 0.031-0.313l1.344-7.812-5.688-5.531c-0.187-0.203-0.391-0.469-0.391-0.75 0-0.469 0.484-0.656 0.875-0.719l7.844-1.141 3.516-7.109c0.141-0.297 0.406-0.641 0.766-0.641s0.625 0.344 0.766 0.641l3.516 7.109 7.844 1.141c0.375 0.063 0.875 0.25 0.875 0.719z&quot;&gt;&lt;/path&gt;&lt;/svg&gt;Key insights&lt;/div&gt;&lt;ul&gt;&lt;li&gt;51% of Australian IT and cybersecurity professionals have privacy concerns and 46% fear potential identity theft from implementing or using biometric protections.&lt;/li&gt;&lt;li&gt;97% of Australian IT and cybersecurity professionals are satisfied with biometric authentication results.&lt;/li&gt;&lt;li&gt;66% of Australian IT and security professionals say their companies have developed specific measures to defend against AI-generated deepfake attacks.&lt;/li&gt;&lt;li&gt;88% of surveyed professionals work in companies that have increased their investments in cybersecurity over the last 18 months.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&quot;Privacy-concerns-are-a-challenge-for-businesses-using-biometric-authentication-despite-satisfactory-results&quot;&gt;Privacy concerns are a challenge for businesses using biometric authentication despite satisfactory results&lt;/h2&gt;&lt;p&gt;Biometrics have commonly been adopted to protect access to company systems and remain common in Australian businesses. Nearly two-thirds (64%) of Australian respondents work in companies where employers require the use of biometric authentication to tighten cybersecurity (above the global average of 53%).&lt;/p&gt;&lt;img title=&quot;1-type-biometrics-implemented-AU-GA-stacked-bar-chart&quot; alt=&quot;Multibarchart showing types of biometric authentication implemented in Australian companies compared to the global average&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/oBB4cWJuiWRfdXRy4SKZX/00382a2d4fdfa660d45e1a75e5ff3838/1-type-biometrics-implemented-AU-GA-stacked-bar-chart.jpg&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/oBB4cWJuiWRfdXRy4SKZX/00382a2d4fdfa660d45e1a75e5ff3838/1-type-biometrics-implemented-AU-GA-stacked-bar-chart.jpg?w=400 400w, https://images.ctfassets.net/63bmaubptoky/oBB4cWJuiWRfdXRy4SKZX/00382a2d4fdfa660d45e1a75e5ff3838/1-type-biometrics-implemented-AU-GA-stacked-bar-chart.jpg?w=700 700w, https://images.ctfassets.net/63bmaubptoky/oBB4cWJuiWRfdXRy4SKZX/00382a2d4fdfa660d45e1a75e5ff3838/1-type-biometrics-implemented-AU-GA-stacked-bar-chart.jpg?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/oBB4cWJuiWRfdXRy4SKZX/00382a2d4fdfa660d45e1a75e5ff3838/1-type-biometrics-implemented-AU-GA-stacked-bar-chart.jpg?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/oBB4cWJuiWRfdXRy4SKZX/00382a2d4fdfa660d45e1a75e5ff3838/1-type-biometrics-implemented-AU-GA-stacked-bar-chart.jpg?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;Besides employers, biometric authentication methods are proving satisfactory to various other users. Overall, 97% of Australian respondents who use biometric authentication are either satisfied or extremely satisfied with the results. &lt;/p&gt;&lt;p&gt;Despite being vulnerable to cyberattacks, they can still make up part of a strong defensive strategy, especially as a step of &lt;a href=&quot;/directory/3814/multi-factor-authentication/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;multi-factor authentication (MFA)&lt;/a&gt;. Having multiple steps of secure authentication still remains a strong tactic for thwarting potential cybersecurity breaches.&lt;/p&gt;&lt;p&gt;Based on our survey, just over half (51%) of Aussie respondents identify high privacy concerns as their biggest challenge when using biometric protections above other potential issues such as identity theft and data breaches.&lt;/p&gt;&lt;img title=&quot;2-challenges-integrating-biometrics-AU-GA-bar-chart&quot; alt=&quot;Bar chart showing the challenges most commonly faced by Australian businesses that implement biometric authentication&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/7J9pFrTbtWiZ4tbpkBTKAc/5cc5ec58a558cdb24373d43beacbfc95/2-challenges-integrating-biometrics-AU-GA-bar-chart.jpg&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/7J9pFrTbtWiZ4tbpkBTKAc/5cc5ec58a558cdb24373d43beacbfc95/2-challenges-integrating-biometrics-AU-GA-bar-chart.jpg?w=400 400w, https://images.ctfassets.net/63bmaubptoky/7J9pFrTbtWiZ4tbpkBTKAc/5cc5ec58a558cdb24373d43beacbfc95/2-challenges-integrating-biometrics-AU-GA-bar-chart.jpg?w=700 700w, https://images.ctfassets.net/63bmaubptoky/7J9pFrTbtWiZ4tbpkBTKAc/5cc5ec58a558cdb24373d43beacbfc95/2-challenges-integrating-biometrics-AU-GA-bar-chart.jpg?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/7J9pFrTbtWiZ4tbpkBTKAc/5cc5ec58a558cdb24373d43beacbfc95/2-challenges-integrating-biometrics-AU-GA-bar-chart.jpg?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/7J9pFrTbtWiZ4tbpkBTKAc/5cc5ec58a558cdb24373d43beacbfc95/2-challenges-integrating-biometrics-AU-GA-bar-chart.jpg?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;To top it all off, trust is now coming under threat from another source. With an increase in AI-generated attacks, including deepfake fraud, targeted phishing attacks, malware, and impersonations, Australian businesses are concerned about using biometrics. &lt;/p&gt;&lt;p&gt;Out of all countries surveyed, Australians had the highest number of respondents (80%) in companies with biometrics measures worrying about AI’s potential to create synthetic fingerprints, facial images, or voices for ID fraud.&lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;&lt;svg viewbox=&quot;0 0 24 24&quot; aria-hidden=&quot;true&quot; class=&quot;icon icon-gear box-header__icon align-middle mb-1 me-2&quot;&gt;&lt;path d=&quot;M 9.6660156 2 L 9.1757812 4.5234375 C 8.3516137 4.8342536 7.5947862 5.2699307 6.9316406 5.8144531 L 4.5078125 4.9785156 L 2.171875 9.0214844 L 4.1132812 10.708984 C 4.0386488 11.16721 4 11.591845 4 12 C 4 12.408768 4.0398071 12.832626 4.1132812 13.291016 L 4.1132812 13.292969 L 2.171875 14.980469 L 4.5078125 19.021484 L 6.9296875 18.1875 C 7.5928951 18.732319 8.3514346 19.165567 9.1757812 19.476562 L 9.6660156 22 L 14.333984 22 L 14.824219 19.476562 C 15.648925 19.165543 16.404903 18.73057 17.068359 18.185547 L 19.492188 19.021484 L 21.826172 14.980469 L 19.886719 13.291016 C 19.961351 12.83279 20 12.408155 20 12 C 20 11.592457 19.96113 11.168374 19.886719 10.710938 L 19.886719 10.708984 L 21.828125 9.0195312 L 19.492188 4.9785156 L 17.070312 5.8125 C 16.407106 5.2676813 15.648565 4.8344327 14.824219 4.5234375 L 14.333984 2 L 9.6660156 2 z M 11.314453 4 L 12.685547 4 L 13.074219 6 L 14.117188 6.3945312 C 14.745852 6.63147 15.310672 6.9567546 15.800781 7.359375 L 16.664062 8.0664062 L 18.585938 7.40625 L 19.271484 8.5917969 L 17.736328 9.9277344 L 17.912109 11.027344 L 17.912109 11.029297 C 17.973258 11.404235 18 11.718768 18 12 C 18 12.281232 17.973259 12.595718 17.912109 12.970703 L 17.734375 14.070312 L 19.269531 15.40625 L 18.583984 16.59375 L 16.664062 15.931641 L 15.798828 16.640625 C 15.308719 17.043245 14.745852 17.36853 14.117188 17.605469 L 14.115234 17.605469 L 13.072266 18 L 12.683594 20 L 11.314453 20 L 10.925781 18 L 9.8828125 17.605469 C 9.2541467 17.36853 8.6893282 17.043245 8.1992188 16.640625 L 7.3359375 15.933594 L 5.4140625 16.59375 L 4.7285156 15.408203 L 6.265625 14.070312 L 6.0878906 12.974609 L 6.0878906 12.972656 C 6.0276183 12.596088 6 12.280673 6 12 C 6 11.718768 6.026742 11.404282 6.0878906 11.029297 L 6.265625 9.9296875 L 4.7285156 8.59375 L 5.4140625 7.40625 L 7.3359375 8.0683594 L 8.1992188 7.359375 C 8.6893282 6.9567546 9.2541467 6.6314701 9.8828125 6.3945312 L 10.925781 6 L 11.314453 4 z M 12 8 C 9.8034768 8 8 9.8034768 8 12 C 8 14.196523 9.8034768 16 12 16 C 14.196523 16 16 14.196523 16 12 C 16 9.8034768 14.196523 8 12 8 z M 12 10 C 13.111477 10 14 10.888523 14 12 C 14 13.111477 13.111477 14 12 14 C 10.888523 14 10 13.111477 10 12 C 10 10.888523 10.888523 10 12 10 z&quot;&gt;&lt;/path&gt;&lt;/svg&gt;The pros and cons of biometrics for user security&lt;/div&gt;&lt;p&gt;Varied biometric login methods can enhance or weaken the protective capacity of a business. While it&amp;#39;s easier for bad actors to spoof more recognisable biometric features, businesses can ensure robust protection by leveraging biometrics as just one part of the identification process instead of making it the only mode of authentication.&lt;/p&gt;&lt;p&gt;Adding an extra step of security verification can make all the difference. Businesses offering optional use of single-factor access sign-on can make it easier for hackers to breach a company&amp;#39;s defences. Hackers responsible for the recent breaches affecting the data of 500 million Ticketmaster users took advantage of this by targeting specific users of one of the company’s cloud providers who had not enforced multi-step authentication access across the board. [2]&lt;/p&gt;&lt;p&gt;Therefore, businesses should ensure employees require multiple factors to identify themselves and do not have biometric authentication as an opt-in only.&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&quot;Australian-IT-professionals-brace-themselves-with-a-deepfake-response-plan&quot;&gt;Australian IT professionals brace themselves with a deepfake response plan &lt;/h2&gt;&lt;p&gt;Deepfake content and live videos present a worrying problem for company executives. These impersonation attacks allow cybercriminals to access sensitive information or make fraudulent transactions by using the visual appearance of a trusted employee or a company leader. &lt;/p&gt;&lt;p&gt;In fact, the threat and fear of these attacks have already generated action. We found that 66% of Aussie IT professionals work in organisations where &lt;a href=&quot;/directory/1035/cybersecurity/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;cybersecurity&lt;/a&gt; or &lt;a href=&quot;/directory/771/it-management/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;IT management&lt;/a&gt; teams have developed specific measures against the risks of AI-generated deepfakes and their potential to impersonate senior executives. &lt;/p&gt;&lt;p&gt;Companies can respond to the dangers of deepfakes in various ways, using &lt;a href=&quot;/directory/3809/security-awareness-training/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;training&lt;/a&gt; and software solutions in tandem. &lt;/p&gt;&lt;img title=&quot;3-deepfake-prevention-measures-AU-GA-stacked-bar-chart&quot; alt=&quot;Multibar chart showing Australian prevention methods for deepfakes compared to the global average&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/43KnEmvwiCkvyq2zTHKeSQ/c66ef757b233b8bd679c40e32a4ca3be/3-deepfake-prevention-measures-AU-GA-stacked-bar-chart.jpg&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/43KnEmvwiCkvyq2zTHKeSQ/c66ef757b233b8bd679c40e32a4ca3be/3-deepfake-prevention-measures-AU-GA-stacked-bar-chart.jpg?w=400 400w, https://images.ctfassets.net/63bmaubptoky/43KnEmvwiCkvyq2zTHKeSQ/c66ef757b233b8bd679c40e32a4ca3be/3-deepfake-prevention-measures-AU-GA-stacked-bar-chart.jpg?w=700 700w, https://images.ctfassets.net/63bmaubptoky/43KnEmvwiCkvyq2zTHKeSQ/c66ef757b233b8bd679c40e32a4ca3be/3-deepfake-prevention-measures-AU-GA-stacked-bar-chart.jpg?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/43KnEmvwiCkvyq2zTHKeSQ/c66ef757b233b8bd679c40e32a4ca3be/3-deepfake-prevention-measures-AU-GA-stacked-bar-chart.jpg?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/43KnEmvwiCkvyq2zTHKeSQ/c66ef757b233b8bd679c40e32a4ca3be/3-deepfake-prevention-measures-AU-GA-stacked-bar-chart.jpg?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;Simulation exercises can help organisations identify risks, enhance training by providing hands-on experience, and can help validate a response plan. Australian companies must put more emphasis on these to increase their preparedness for a cybersecurity attack as they fall behind the global average.&lt;/p&gt;&lt;p&gt;Awareness and practice of encountering deepfake attacks are both important to prepare the workforce to deal with these evolving threats. These approaches combine both theoretical awareness and a practical element to help employees spot the dangers and keep on their toes when a real attack comes along.&lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;&lt;svg viewbox=&quot;0 0 16 16&quot; aria-hidden=&quot;true&quot; class=&quot;icon icon-lightbulb box-header__icon align-middle mb-1 me-2&quot;&gt;&lt;path fill-rule=&quot;evenodd&quot; clip-rule=&quot;evenodd&quot; d=&quot;M4.98035 14.5098C4.98035 14.1776 5.24966 13.9083 5.58186 13.9083H10.5491C10.8813 13.9083 11.1506 14.1776 11.1506 14.5098C11.1506 14.842 10.8813 15.1113 10.5491 15.1113H5.58186C5.24966 15.1113 4.98035 14.842 4.98035 14.5098Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;path fill-rule=&quot;evenodd&quot; clip-rule=&quot;evenodd&quot; d=&quot;M4.98035 13.5164C4.98035 13.1842 5.24966 12.9149 5.58186 12.9149H10.5491C10.8813 12.9149 11.1506 13.1842 11.1506 13.5164C11.1506 13.8486 10.8813 14.1179 10.5491 14.1179H5.58186C5.24966 14.1179 4.98035 13.8486 4.98035 13.5164Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;path fill-rule=&quot;evenodd&quot; clip-rule=&quot;evenodd&quot; d=&quot;M8.06549 1.20301C5.38001 1.20301 3.20301 3.38001 3.20301 6.06549C3.20301 7.44115 3.7735 8.68254 4.69241 9.56779C4.9541 9.81989 5.20656 10.1313 5.37115 10.5134L5.97769 11.9214H10.1533L10.7598 10.5134C10.9244 10.1313 11.1769 9.81989 11.4386 9.56779C12.3575 8.68254 12.928 7.44115 12.928 6.06549C12.928 3.38001 10.751 1.20301 8.06549 1.20301ZM2 6.06549C2 2.71561 4.71561 0 8.06549 0C11.4154 0 14.131 2.71561 14.131 6.06549C14.131 7.7813 13.4177 9.33156 12.2732 10.4342C12.0857 10.6148 11.9469 10.7985 11.8647 10.9893L11.1015 12.7609C11.0065 12.9815 10.7893 13.1244 10.5491 13.1244H5.58186C5.34164 13.1244 5.12446 12.9815 5.02943 12.7609L4.26629 10.9893C4.18411 10.7985 4.0453 10.6148 3.85778 10.4342C2.71323 9.33156 2 7.7813 2 6.06549Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;path d=&quot;M5.58186 15.0065H10.5491L10.3184 15.468C10.1554 15.794 9.82212 16 9.45759 16H6.67338C6.30885 16 5.9756 15.794 5.81258 15.468L5.58186 15.0065Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;/svg&gt;How organisations can identify a deepfake&lt;/div&gt;&lt;p&gt;As deepfaking executives and employees on video calls become more prevalent, it is important to be aware of the signs to look out for to know if something is up. Some common features of deepfake videos include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Jerky or unnatural body movement &lt;/li&gt;&lt;li&gt;Blurring around facial features&lt;/li&gt;&lt;li&gt;Unnatural eye-movements&lt;/li&gt;&lt;li&gt;Unusual colouration&lt;/li&gt;&lt;li&gt;Inconsistent audio&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Additionally, if you are in doubt about the person you are speaking to, you can make it easier to spot deepfakes by asking them to turn their head 90° to the side to see a profile view of their face. This can disrupt the software algorithm that projects another face onto the speaker as it has to adapt to a shape it is not as used to working with.&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&quot;7-low-cost-ways-Australian-companies-can-increase-their-cybersecurity-efforts&quot;&gt;7 low-cost ways Australian companies can increase their cybersecurity efforts&lt;/h2&gt;&lt;p&gt;As the risks in the current security landscape are urgent, reallocating or raising spending on cyber defence is a major question small businesses are facing.&lt;/p&gt;&lt;p&gt;Unsurprisingly, our study shows that spending has been on the rise. Amongst our sample, 88% of Australian respondents report that their company’s cybersecurity spending has grown over the last 18 months, far above the global average of 77%.&lt;/p&gt;&lt;img title=&quot;4-security-measures-to-prevent-cyberattacks-AU-GA-bar-chart&quot; alt=&quot;Bar chart showing the top five security measures Australian companies have implemented in the last 18 months to prevent cyberattacks&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/2VMY7Mc6kWsf9v3TRHegIG/c622fd2631bffe719a68230cf4658f8b/4-security-measures-to-prevent-cyberattacks-AU-GA-bar-chart.jpg&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/2VMY7Mc6kWsf9v3TRHegIG/c622fd2631bffe719a68230cf4658f8b/4-security-measures-to-prevent-cyberattacks-AU-GA-bar-chart.jpg?w=400 400w, https://images.ctfassets.net/63bmaubptoky/2VMY7Mc6kWsf9v3TRHegIG/c622fd2631bffe719a68230cf4658f8b/4-security-measures-to-prevent-cyberattacks-AU-GA-bar-chart.jpg?w=700 700w, https://images.ctfassets.net/63bmaubptoky/2VMY7Mc6kWsf9v3TRHegIG/c622fd2631bffe719a68230cf4658f8b/4-security-measures-to-prevent-cyberattacks-AU-GA-bar-chart.jpg?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/2VMY7Mc6kWsf9v3TRHegIG/c622fd2631bffe719a68230cf4658f8b/4-security-measures-to-prevent-cyberattacks-AU-GA-bar-chart.jpg?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/2VMY7Mc6kWsf9v3TRHegIG/c622fd2631bffe719a68230cf4658f8b/4-security-measures-to-prevent-cyberattacks-AU-GA-bar-chart.jpg?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;However, as we can see, higher expenditure isn’t the only solution available to companies. There are also relatively straightforward, cost-effective optimisations that companies can implement to improve their defences. Here, we list seven measures firms can deploy:&lt;/p&gt;&lt;h3&gt;1. Formulate a strategy for managing deepfakes &lt;/h3&gt;&lt;p&gt;Companies should prioritise a strategy for tackling deepfake attacks. This strategy could incorporate a two-pronged approach: raising awareness of the dangers and simulating the kinds of attacks staff may encounter, which might be crucial when a real threat arises.&lt;/p&gt;&lt;p&gt;Additionally, when addressing the threat of deepfake phishing, it is worth considering using a deepfake detection tool as an extra layer of security. These can monitor video calls and messages to scan for telltale signs of a fake image or appearance and notify users accordingly. &lt;/p&gt;&lt;h3&gt;2. Conduct a network security audit&lt;/h3&gt;&lt;p&gt;Where senior executives are being targeted, it is vital to review your company&amp;#39;s network security for any vulnerabilities that could easily allow a cyberattack to succeed. We found that 48% of our sample whose senior executives were targeted by cyberattackers are prioritising improvements to their network security and this is key to underpinning security.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/directory/1443/network-security/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Network security software&lt;/a&gt; should be standard in every company. It protects against cyberattacks and data loss by detecting and blocking threats such as viruses, malware, and unauthorised access. It also improves network integrity and availability, resulting in a more stable and secure IT infrastructure. &lt;/p&gt;&lt;h3&gt;3. Prepare executives for emerging realities&lt;/h3&gt;&lt;p&gt;Executives are a prize target for scammers or threat actors due to their levels of access and oversight over major transactions and decisions in a company. New threats such as deepfakes require extra commitment to this goal.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/directory/3809/security-awareness-training/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Security awareness training software&lt;/a&gt; can prove practical for executives and other staff, offering up-to-date guidance on how to spot and respond to the latest threats.&lt;/p&gt;&lt;h3&gt;4. Secure your data with encryption &lt;/h3&gt;&lt;p&gt;Unprotected data is a goldmine for cybercriminals and can be used to socially engineer a cyberattack on your business. Therefore, it is especially essential to ensure business data is stored and shared securely.&lt;/p&gt;&lt;p&gt;Having a strong &lt;a href=&quot;/directory/472/encryption/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;data encryption solution&lt;/a&gt; is key. This makes the data harder to access and interpret without the right authorisation. So, even if a hacker gets away with information, they may not be able to use it.  &lt;/p&gt;&lt;h3&gt;5. Enforce routine update schedules&lt;/h3&gt;&lt;p&gt;The latest updates usually prioritise security patches to prevent vulnerabilities from being exploited. According to our sample, software updates are a priority for 45% of previously targeted companies, representing a small but significant step toward better security.&lt;/p&gt;&lt;p&gt;A good trick here is to use &lt;a href=&quot;/directory/1125/patch-management/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;patch management software&lt;/a&gt; across a business to ensure updates, drivers, and firmware are kept up to date as new patches are released. This tool can monitor software for upgraded versions and enforce compliance with update schedules.&lt;/p&gt;&lt;h3&gt;6. Implement multi-layered protection&lt;/h3&gt;&lt;p&gt;As we’ve seen, it’s important to ensure multiple levels of cybersecurity protection to enhance cybersecurity as newer forms of biometric authentication are on the rise. This is integral to preventing attacks from succeeding and making the process of breaching your defences more complicated for an attacker.&lt;/p&gt;&lt;p&gt;Having a strong &lt;a href=&quot;/directory/3814/multi-factor-authentication/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;multi-factor authentication (MFA) system&lt;/a&gt; in place can also help alleviate emerging concerns about the safety of authentication software and biometric security and create better confidence in cybersafety. When doing so, it can help to look out for software providers who offer features such as enhanced fraud detection and low-code integrations. &lt;/p&gt;&lt;h3&gt;7. Enhance your password policy&lt;/h3&gt;&lt;p&gt;A good password policy is a company-wide concern. This is an ever-more-important issue to ensure each step of security is up to the challenge of today’s technical landscape, especially as trust in biometrics drops. Moreover, a strong password policy is only going to get more vital as AI tools emerge that can crack passwords with greater ease. [3]&lt;/p&gt;&lt;p&gt;The use of &lt;a href=&quot;/directory/3797/self-service-password-reset-sspr/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;self-service password reset (SSPR) tools&lt;/a&gt; can prove vital in this regard. They can help ensure staff regularly update their passwords and set parameters for the level of complexity a password must have.&lt;/p&gt;&lt;h2 id=&quot;Preparation-is-essential-to-combat-biometric-fraud&quot;&gt;Preparation is essential to combat biometric fraud&lt;/h2&gt;&lt;p&gt;The threat posed by biometric fraud and deepfake technology is a serious cause for concern for companies. However, the good news is that steps can be taken to get ahead of cybercriminals. &lt;/p&gt;&lt;p&gt;In many ways, the fear of these threats has galvanised companies to examine their security provisions more closely and make improvements. This helps defend against not only newer threats but also more established dangers. &lt;/p&gt;&lt;p&gt;Looking forward, it is likely that newer threats to trusted security measures like biometrics will grow as techniques for sidestepping them evolve, but being forewarned is being forearmed. As we observed in our data, companies are responding to this challenge by spreading internal awareness, and staying on top of this will be important as a first line of defence.&lt;/p&gt;&lt;p&gt;This preparedness also needs to go beyond a one-size-fits-all approach. Company executives represent a major target for cybercriminals and this requires some special measures as we observe in part two of this survey analysis.&lt;/p&gt;&lt;div class=&quot;box-idea&quot;&gt;Looking for &lt;a href=&quot;/directory/1035/cybersecurity/software&quot; rel=&quot;noopener noreferrer&quot; class=&quot;event&quot; data-evna=&quot;engagement_facet_click&quot; data-evcmp=&quot;blog-idea&quot; data-evdst=&quot;go-to_category-page&quot; data-evdtl=&quot;text-link_category-name&quot; target=&quot;_blank&quot;&gt;cybersecurity software&lt;/a&gt;? Check out our catalogue.&lt;/div&gt;&lt;p&gt;&lt;/p&gt;","dateModified":"2024-09-15T20:30:04.000000Z","datePublished":"2024-09-15T20:30:04.000000Z","headline":"AI cyberattacks push 66% Aussie companies to have a deepfake response plan","inLanguage":"en-AU","mainEntityOfPage":"https://www.getapp.com.au/blog/6892/deepfake-response-plan-ai-cyberattacks#webpage","publisher":{"@id":"https://www.getapp.com.au/#organization"}}]}
</script>
