NetSolutionsPro Blog

NetSolutionsPro Blog

NetSolutions Pro has been serving Indiana, Michigan, and Chicagoland since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are You Sure the Voice on the Other End of the Phone is Your Boss?

Are You Sure the Voice on the Other End of the Phone is Your Boss?

For a long time, one of the best practices for phishing prevention has been to pick up the phone and call up the person apparently sending a message. Unfortunately, in some cases, phone calls are now being exploited.

Now, AI enables scammers to mimic the voices of the people they impersonate through voice cloning. As a result, it is more important than ever to verify who you are talking to before sharing any sensitive information.

How Does AI Voice Cloning Work?

Let’s say that we were going to wage a cyberattack on Generic Business Co. If President and CEO Jill Smith of Generic Business Co. had spoken enough on video, we could take her voice and use software to make a copy. Then, thanks to text-to-speech, we would have the power to say whatever we wanted in Jill’s voice.

Internet personality and entertainer Daniel Thrasher shared a video that very effectively highlights how simple it is to do so.

While Daniel’s video focused on the dangers of interpersonal scams, the utility to business-focused cybercriminals is clear. As the comedian used examples like “forgetting the access code to the garage” being a scammer’s ruse, it is just as easy to imagine someone sending an employee a copy of your voice that instructs them to transfer funds, or impersonating a vendor to request payment card information. 

How to Stay Secure

Sometimes, the best response to a high-tech threat is the most old-fashioned option. In this case, it makes the most sense to adopt a challenge-response protocol whenever any requests are made. 

This protocol is effective because it actively reinforces legitimacy by double-checking that the person on the other end is who they claim to be before any sensitive information is shared. Basically, any instruction to transfer funds or change a password over the phone must be confirmed via a secondary method… multi-factor authentication for your communications.

Spotting a Scammy Call 

Deepfake technology and AI have made it tough to spot these kinds of scams, but it isn’t impossible. There are still signs that can help signal there’s trouble afoot, such as:

  • Odd pauses
  • A lack of, or mismatched, emotional inflection
  • Looping background noises

In addition, some of the standard phishing prevention rules apply… namely, extreme urgency. If someone is pushing for you to break protocol over the phone, hang up and reach out in some other way to confirm.

Scams are getting harder and harder to foil. We can help put you in the best position to succeed. Give us a call at (574) 453-3323 to learn more.

Your Guide to the CIA Triad (AKA The 3 Pillars of ...

About NetSolutionsPro

NetSolutionsPro has been serving the Indiana and Michigan area since 1995, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

Mon to Fri 8:00am to 5:00pm

Tech Support

(574) 453-3323