Feb 19 2026
Security

Are Businesses Ready To Guard Against Deepfake Phishing Attempts?

Business leaders can approach this evolving threat with a multilayered strategy.

Most business leaders are likely familiar with the serious deepfake phishing attack that happened in early 2024, when a multinational company lost $25 million after an employee mistakenly believed a videoconferencing call with scammers masquerading as other team members, including the CFO. 

Since then, generative artificial intelligence and the processes to create even more convincing doctored images and videos have only improved. In its 2025 Global Threat Landscape Report, Fortinet found that AI was “supercharging the cybercrime supply chain,” with readily available tools that automate the creation of deepfake videos, synthetic voices and more. 

Palo Alto Networks researchers have also documented instances where malicious actors are using deepfakes of notable figures for political or financial gain. Scrolling through these instances, business leaders and their employees may think they could easily recognize an attempted scam, but one survey found that 43% of finance workers admitted to falling for one. 

DISCOVER: Follow these AI data governance strategies for success.

“Many deepfake phishing campaigns are fueled by information obtained from compromised accounts, and this link to a previous victim can make social engineering more credible since outreach appears to come from a legitimate contact,” says Jim Richberg, head of cyber policy and global field CISO at Fortinet. Because of that possible connection, enterprise IT help desks may have a harder time parsing who is a legitimate employee asking for a password reset and who is a bad actor trying to gain unauthorized access.

Click the banner below to learn why identity access solutions can help your organization.

 

That’s why updated, foundational user training should remain a key part of a business’s security strategy. Sure, the technology may have gotten more convincing, but emphasizing the motives and tactics of phishing (an unusual request or an attempt to create a sense of urgency) can help organizations ground employee education amid a changing threat landscape, Richberg says. 

A Multilayered Approach to Deepfake Phishing Threats 

Traditional email filters and text-based protections may not be enough anymore. 

“AI-fueled voice and video impersonation can now handle interactive conversations with help desk staff, and the large language models supporting generative AI tools can often provide real-time answers to individual-specific questions — such as, ‘What was your high school’s mascot?’ — that defeat traditional search engines,” Richberg says. 

As deepfake attempts become even more believable, a multilayered approach of technology, training and tailored organizational processes is essential to protecting users and business operations, he adds. Businesses can leverage security tools that look for indicators of nonhuman and artificial video content. 

Sometimes, the process change can be as simple as slowing down and reviewing the request again on a computer. 

EXPLORE: Learn about these threat and vulnerability management solutions.

“Potential victims are more likely to fall for fakes when they encounter them on mobile devices, so teaching users to wait to act on anything financial or sensitive in nature until they can do so from a full-sized screen gives them a broader perspective, a second chance to review the request and options such as hovering their cursor over a hyperlink that can reveal an unexpected internet destination,” Richberg says. 

Companies may also consider modifying processes to require involvement of a second person or mode of communication on important or high-value transactions, he adds. 

Financial institutions, for example, may want to re-evaluate their biometric-based user authentication processes as AI-fueled deepfake audio capabilities improve to bypass some voice-recognition technology. “This will require organizations employing such technologies to monitor emerging threat capabilities and be willing to upgrade their security technology and practices to stay ahead of this threat,” Richberg says.

gorodenkoff/Getty Images
Close

New Workspace Modernization Research from CDW

See how IT leaders are tackling workspace modernization opportunities and challenges.