Why this matters: A single deepfake video call could cost the company millions. You are the final firewall.
Attention: The Split-Second Trap
You join an unscheduled Zoom call with your Division Head. They look slightly "off" but sound exactly right. They say: "I'm at a conference, need you to approve this emergency vendor payment now. I'll stay on the line."
What is your immediate action?
The Synthetic Media Landscape
Attackers use Generative AI to clone humans across three main dimensions. Understanding these signatures is your first line of defense.
- Digital Jitter: Glitches around the mouth or jawline.
- Mismatched Audio: Voices that don't match lip movements.
- Extreme Urgency: Pressure to act quickly to bypass thought.
The MCV Protocol
Multi-Channel Verification (MCV) is the mandatory SOP for any high-risk request. Click each step to reveal the protocol requirements.
Check-In: MCV Applied
You receive an urgent voice call from the CFO requesting an MFA code. What is the most compliant next step?
The Defense Stack
Technology catches 99% of threats. You are the final layer that catches the "Impossible 1%."
Filters catch malicious links and spoofed headers. MFA stops basic credential theft. But only you can detect an unusual tone of voice or a suspicious request for an "emergency wire."
The Reporting Sequence
A detected attempt is a piece of intelligence. Reporting it protects the whole company.
Security then initiates a global block on the attacker's source.
Check-In: Incident Management
You recognized a deepfake call and hung up. What is your remaining obligation?
Key Takeaways
- Trust but Verify: AI can clone any person. Never trust media alone for high-risk requests.
- Channel Hopping: The MCV protocol (switching channels) is your strongest weapon.
- Urgency = Alarm: Treat extreme pressure as a primary indicator of fraud.
- Report to Protect: Your report helps the company block future attacks.
Assessment Starting
You are about to begin the assessment. Select the best answer for each question.