Cybersecurity firm Palo Alto Networks reports that a fake job applicant can be created in just 70 minutes usingdeepfake technology, posing a significant threat to employers. These AI-generated candidates can deceive hiringmanagers during video interviews, potentially…
Posts by Category: IT and Data Security Hiring
Avoid EEOC Complaints
Although criminal histories can be among the most important for identifying potentially problematic employees, recent EEOC Guidelines elaborate on the use of criminal histories in hiring practices, and should not be ignored. These guidelines have made it incumbent…
The “Gold Standard”
Many businesses mistakenly believe that the FBI database is the “gold standard” for identifying those with criminal records. But, the FBI database only includes criminal records that have a fingerprint associated with them, and many from the state or county level do…
Potential for Deepfake Audio, Video to Warp Reality is Building to Crisis Level
Persona’s Q1 2025 fraud insights highlight the growing threat of deepfakes, with financial losses from fraud projected to reach $40 billion by 2027. Generative AI tools like ByteDance’s OmniHuman are enabling realistic deepfakes, making defense strategies…
Fake Job Seekers are Flooding U.S. Companies That are Hiring for Remote Positions, Tech CEOs Say
AI-driven job scams are rising, with fake candidates using deepfakes, stolen identities, and AI-generated resumes to land roles and infiltrate companies. By 2028, one in four job applicants may be fake, posing serious cybersecurity risks. U.S. firms have unknowingly…
Data Theft Rises Sharply, Insiders to Blame
A new survey exploring the main causes of corporate data breaches suggests that three out of four organizations in the US have been hit with the loss or theft of sensitive data in the last two years — and insiders are usually the ones at fault.According to the…
New Report Finds Insider Corporate Data Theft and Malware Infections Among Biggest Threat to Digital Business in 2016
Insider data theft and malware attacks top the list of the most significant concerns for enterprise security executives, a new report from Accenture and HfS Research reveals. Of those surveyed, a majority (69%) of respondents experienced an attempted or successful…
Security Clearance Background Checks—McCaskill, Tester Probe Oversight Plans for Creation of New Agency
U.S. Senators Claire McCaskill and Jon Tester are probing the transition of federal security clearance background checks to a newly created agency— raising concerns about whether there is a concrete plan for the creation, operation and oversight of the new bureau. “We…
Prevent Computer Fraud – 1 Tip
In TripleTree, LLC v. Walcker, the employer sued its former employee under the federal Computer Fraud and Abuse Act (CFAA) based on the employee’s accessing certain confidential and proprietary information on the company’s database. TripleTree’s claim failed because…
Nearly One in Three Federal Agencies Lost Data to Insider Threats in the Last Year
According to a new study from MeriTalk, 45% of all federal agencies were targeted by insider threats, with 29% losing data to an insider incident over the past year. The report also found that although 76% of federal agencies are increasing attention on combating…