---
description: Cybersecurity measures for businesses are evolving but deepfakes present a rising threat to Canadian firms. GetApp investigates how to avoid attacks.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/getapp/og_logo-94fd2a03a6c7a0e54fc0c9e21a1c0ce9.png
title: Cybersecurity measures for businesses against deepfakes
---

# Over half of Canadian companies have a deepfake response plan in the wake of rising cyberthreats

Canonical: https://www.getapp.ca/blog/6866/cybersecurity-measures-canadian-business-deepfake-plan

Published on 2024-08-26 | Written by David Jani.

![Over half of Canadian companies have a deepfake response plan in the wake of rising cyberthreats](https://images.ctfassets.net/63bmaubptoky/2NBZv3FBebdLOiUNz9Bt8E/c8c80c3af4869b6a30de83a2b1bb6e57/Biometric-data-executive-cybersecurity-UK-GetApp-HEADER.png)

> New and sophisticated cyberattacks, such as artificial intelligence (AI)- generated deepfakes, present a major threat to Canadian businesses. How can they uphold identity theft protection and cybersecurity against more daring cyberattacks?

-----

## Article Content

New and sophisticated cyberattacks, such as artificial intelligence (AI)- generated deepfakes, present a major threat to Canadian businesses. How can they uphold identity theft protection and cybersecurity against more daring cyberattacks?In this articleCanadian IT professionals have doubts about biometric security methodsDeepfake response plans are catching on in Canada, but is it fast enough?7 cheap and easy fixes to enhance Canadian company cybersecurityPreparation is better than panicCybersecurity measures for businesses are always evolving. As newer threats using AI breakthrough into the mainstream, companies are adapting to cover risks like deepfakes and their capacity to outwit biometric protections. That was a key finding in GetApp’s Executive Cybersecurity Survey\*, which studied the responses of 2,648 IT and cybersecurity professionals globally, including 235 Canadian respondents.This is leading some businesses to rethink their ways to ensure cyber protection including those previously thought unbreakable like biometric access. Companies should aim to weather potential threats from newer technologies by setting up security provisions, from network monitoring to company training.Key insightsWhile 95% say they are satisfied with the results of using biometrics in their company’s security infrastructure, 54% of Canadian IT and cybersecurity professionals identify privacy concerns as a major challenge of using biometric authentication. 57% say their companies have a dedicated plan for dealing with cybersecurity threats such as AI-generated deepfake fraud.75% of Canadian businesses surveyed have increased their company’s cybersecurity investments over the past 18 months.Canadian IT professionals have doubts about biometric security methodsBiometric authentication has been around for many years and has become the default way to confirm identity for many types of software and hardware worldwide. However, it appears that Canadian companies have doubts about its use compared to other countries.Our data showed that companies in Canada are less likely than many peer countries, such as the U.S. and the U.K., to enforce the use of biometric authentication. Just under half (49%) of Canadian respondents work in companies that require the use of biometrics compared with a global average of 53%. Additionally, less than a quarter of Canadians surveyed (24%) work in a company where biometrics are offered as an optional cybersecurity measure.The vast majority (95%) of Canadian professionals using biometric authentication systems are satisfied, suggesting their ease of use and accuracy in identification may be proving a boon to businesses.Despite the positive assessments, users still highlight concerns. Many of the issues noted are longstanding concerns, such as uneasiness over privacy, cost, and user acceptance. These are all fundamental factors that arise from the implementation of biometrics, suggesting Canadian IT professionals could be slightly more skeptical of these tools from the get-go.  However, over a third (37%) of Canadian IT professionals using these systems highlight the risk of identity theft as a worry.While 73% of Canadian respondents use biometric authentication in some capacity, they also have the highest levels of anxiety about emerging threats such as deepfakes. To illustrate, 78% of Canadian respondents (above the global average of 73%) express concerns about the potential of AI to be used for biometric identity fraud, such as the creation of synthetic fingerprints, facial images, or voices.However, it might be too soon to predict the end of biometric security measures just yet. As shown before, they often prove successful when implemented and can definitely provide a stronger layer of authentication than many other identification methods. That said, with trust in biometrics starting from a low point in Canadian companies, newer threats spurred on by generative AI could slow its future adoption in the country.Biometrics aren’t bullet-proof; Ensure multiple layers of protectionWhile businesses have to rethink using biometric security steps, they are still considered valuable to bolster security. Nevertheless, businesses shouldn’t rely on them solely, or indeed any authentication measure without a failsafe.This was recently demonstrated by the data breach affecting 500 million Ticketmaster users. In this cybersecurity incident, the attack succeeded because the company’s cloud provider had not enforced multi-step authentication for all of their users. \[1\]Therefore, it is vital to ensure that multi-factor authentication (MFA) is used and enforced at the company level to keep every staff member properly secured. Deepfake response plans are catching on in Canada, but is it fast enough?As cybersecurity attacks such as deepfakes embed themselves in the public consciousness, companies should take quick and decisive preparatory action to address the threat.It is always important to have a crisis plan in place for many cybersecurity risks. However, this plan must evolve to cover new and developing threats. Companies need to factor in how a deepfake attack could unfold and how they could react if it has any margin of success. Thus far, more than half (57%) of Canadian professionals surveyed work in companies with a dedicated deepfake response plan. However, this is below the global average of 60%, suggesting Canadians have some catching up to do on this front.Companies are taking many different approaches to prepare themselves against cyberattacks. Overall, Canada stands a little behind the global curve in this survey as demonstrated in the graph below. On the other hand, the country also appears strong in measures such as awareness training, suggesting that local businesses may prove better prepared than others in peer countries. Signs you might be talking to a deepfakeDeepfake technology is often used for nefarious purposes. Hence, it is important to know how to figure out if you’re being scammed. Some common features of deepfake videos include:Jerky unnatural body movement Blurring around facial featuresUnnatural eye movementsUnusual colorationInconsistent audioAdditionally, if you are in doubt about the person you are speaking to, you can easily spot discrepancies by asking them to turn their heads 90° to the side to see a profile view of their face. This method to help prevent deepfakes can disrupt the software algorithm that projects another face onto the speaker as it has to adapt to a shape it is not as used to working with.7 cheap and easy fixes to enhance Canadian company cybersecurityEmerging cyberthreats and technologies are pushing companies to enhance investments to ensure advanced cybersecurity checks. This is reflected in the sample we surveyed in Canada, with 75% of respondents saying their firms have raised investment in cybersecurity over the last 18 months. However, companies can adopt numerous security vulnerability fixes to improve their defenses relatively quickly without spending much on deployment.For instance, we noted that Canadian respondents working in companies that have been hit by cyberattacks in the 18 months prior focus on simple but essential responses, as the graph below indicates. The priorities listed above can be essential for good cybersecurity health and in many cases can be implemented cost-effectively. To ensure Canadian companies ensure proper protection from both conventional threats and newer more technologically advanced risks, we’ve highlighted seven measures that companies could deploy:1. Develop a deepfake planWhilst many in our sample have a deepfake plan in place, a good deal (43%) of companies in Canada don’t have it or are unsure about it. For those without a plan, it is important to rectify the situation.The plan itself should ideally examine ways to strengthen protection against deepfake attacks by prioritizing staff cybersecurity awareness and training. Additionally, it is important to prepare a crisis plan that details steps to take should an attack begin to succeed so proper procedures are in place.2. Provide multiple layers of protectionAs evidenced by recent deepfake fraud and cyberattacks, having multi-factor authentication (MFA) on your systems is key. This ensures that if one form of identification and authentication is breached, there are at least others that could withstand a threat.MFA software is an important inclusion to achieve this. This might involve passwords, memorable information, or even biometrics. Whilst we’ve seen concerns about the security of biometrics, they still offer a great deal of protection and should be considered for at least one step of authentication. When selecting a viable system, it can help to look out for software providers who offer features such as enhanced fraud detection and low-code integrations.3. Audit security at a network levelAt a time when new threats such as deepfakes are rising in profile, it is vital to review your company's network security. Any vulnerabilities in this infrastructure could easily allow a cyberattack to succeed. We found that this was a major priority for Canadian businesses with 53% of our sample whose senior execs were targeted by cyberattackers. This is key to underpinning security.Network security software should be standard in every company. It protects against cyberattacks and data loss by detecting and blocking threats such as viruses, malware, and unauthorized access. It also improves network integrity and availability, creating a more stable and secure IT infrastructure.4. Enforce software update schedulesLeaving software unpatched can have severe security consequences. 45% of the professionals we surveyed in Canada working in businesses targeted by a cyber breach in the last 18 months are now making software updates a priority.Businesses can benefit from deploying patch management software that scans software for updates and ensures they are automatically updated. This will ensure that your tech stack remains fully patched, updated, and secure with the latest security protections.5. Strengthen password policiesA good password policy is a company-wide concern. This is an ever-more-important issue to ensure each step of security is up to the challenge of today’s technical landscape, especially as trust in biometric verification drops. Moreover, a strong password policy will only get more vital as AI tools emerge that can crack passwords with greater ease. \[2\]Implementing self-service password reset (SSPR) software tools can be useful in this regard. They can help ensure staff regularly update their passwords and set parameters for the complexity of a password.6. Provide enough training to executivesExecutives are a prize target for scammers due to their levels of access and oversight of major transactions and decisions in a company. New threats, such as deepfakes, require extra commitment to this goal.Security awareness training software can prove practical for executives and other staff, offering up-to-date guidance on spotting and responding to the latest threats.  7. Encrypt data appropriatelyUnprotected data makes your business an easy target for attacks. Therefore, ensuring that business data is stored and shared securely is essential.Having a strong data encryption solution is key. This makes the data harder to access and interpret without the right authorization, so even if a hacker gets away with information, they may not be able to use it.Preparation is better than panicThere’s no doubt that new threats, such as deepfakes, which can undermine biometric protection, are a cause for concern. However, there is much that can be done to face up to the threat.Extra preparedness needs to be an active focus across a business and should apply to all employees regardless of their position in the business. In our next report, we will investigate this in greater detail and study how companies can do more to protect senior leadership from becoming a target for a cyberattack.Looking for network monitoring software? Check out our catalogue.

## Disclaimer

> Methodology\*GetApp's Executive Cybersecurity Survey was conducted in May 2024 among 2,648 respondents in the U.S. (n=238), Canada (n=235), Brazil (n=246), Mexico (n=238), the U.K. (n=254), France (n=235), Italy (n=233), Germany (n=243), Spain (n=243), Australia (n=241), and Japan (n=242). The goal of the study was to explore how IT and cybersecurity professionals are responding to the rising threat of biometric fraud. Respondents were screened for IT and cybersecurity roles at companies that use security software and have more than one employee. Respondents were screened for involvement in, or full awareness of, cybersecurity measures implemented at their company.Sources:Ticketmaster confirms hack which could affect 560m, BBCThis scary AI recognizes passwords by the sound of your typing, PC World

## About the author

### David Jani

David is a Content Analyst for the UK, providing key insights into tech, software and business trends for SMEs. Cardiff University graduate. He loves traveling, cooking and F1.

## Related Categories

- [Artificial Intelligence Software](https://www.getapp.ca/directory/1397/artificial-intelligence/software)
- [Cybersecurity Software](https://www.getapp.ca/directory/1035/cybersecurity/software)
- [Help Desk Software](https://www.getapp.ca/directory/287/help-desk-ticketing/software)
- [IT Service Software](https://www.getapp.ca/directory/1049/it-service/software)
- [Network Security Software](https://www.getapp.ca/directory/1443/network-security/software)

## Related Articles

- [AI-enhanced malware and phishing worry Canadian IT pros most for 2025, learn four ways to get secure](https://www.getapp.ca/blog/7229/canada-data-security-worries-it-professionals)
- [A guide to digital non profit solutions](https://www.getapp.ca/blog/2370/a-guide-to-digital-non-profit-solutions)
- [54% of surveyed senior managers use anti-phishing software](https://www.getapp.ca/blog/4226/protect-business-from-phishing-attacks)
- [A comprehensive guide on how to secure data in the cloud](https://www.getapp.ca/blog/3246/how-to-secure-data-in-cloud)
- [Data protection and the CPPA: What you need to know](https://www.getapp.ca/blog/2197/cppa-business-compliance-canada)

## Links

- [View on GetApp](https://www.getapp.ca/blog/6866/cybersecurity-measures-canadian-business-deepfake-plan)
- [Blog](https://www.getapp.ca/blog)
- [Home](https://www.getapp.ca/)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"GetApp Canada","address":{"@type":"PostalAddress","addressLocality":"Toronto","addressRegion":"ON","postalCode":"M2N 7E9","streetAddress":"5000 Yonge Street 14th Floor, Suite 1402 Toronto ON M2N 7E9"},"description":"Review, Compare and Evaluate small business software. GetApp Canada has software offers, SaaS and Cloud Apps, independent evaluations and reviews.","email":"info@getapp.ca","url":"https://www.getapp.ca/","logo":"https://dm-localsites-assets-prod.imgix.net/images/getapp/getapp-logo-light-mode-5f7ee07199c9b3b045bc654a55a2b9fa.svg","@id":"https://www.getapp.ca/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/getapp","https://www.facebook.com/GetAppcom","https://www.linkedin.com/company/getapp-com-a-gartner-company/","https://www.instagram.com/getappcom/","https://www.youtube.com/c/GetAppCom"]},{"name":"GetApp Canada","url":"https://www.getapp.ca/","@id":"https://www.getapp.ca/#website","@type":"WebSite","publisher":{"@id":"https://www.getapp.ca/#organization"},"potentialAction":{"query":"required","target":"https://www.getapp.ca/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Cybersecurity measures for businesses against deepfakes","description":"Cybersecurity measures for businesses are evolving but deepfakes present a rising threat to Canadian firms. GetApp investigates how to avoid attacks.","url":"https://www.getapp.ca/blog/6866/cybersecurity-measures-canadian-business-deepfake-plan","about":{"@id":"https://www.getapp.ca/#organization"},"@id":"https://www.getapp.ca/blog/6866/cybersecurity-measures-canadian-business-deepfake-plan#webpage","@type":"WebPage","isPartOf":{"@id":"https://www.getapp.ca/#website"}},{"description":"New and sophisticated cyberattacks, such as artificial intelligence (AI)- generated deepfakes, present a major threat to Canadian businesses. How can they uphold identity theft protection and cybersecurity against more daring cyberattacks?","author":[{"name":"David Jani","@type":"Person"}],"image":{"url":"https://images.ctfassets.net/63bmaubptoky/2NBZv3FBebdLOiUNz9Bt8E/c8c80c3af4869b6a30de83a2b1bb6e57/Biometric-data-executive-cybersecurity-UK-GetApp-HEADER.png","@id":"https://www.getapp.ca/blog/6866/cybersecurity-measures-canadian-business-deepfake-plan#primaryimage","@type":"ImageObject"},"@type":"BlogPosting","articleBody":"&lt;p&gt;&lt;b&gt;New and sophisticated cyberattacks, such as artificial intelligence (AI)- generated deepfakes, present a major threat to Canadian businesses. How can they uphold identity theft protection and cybersecurity against more daring cyberattacks?&lt;/b&gt;&lt;/p&gt;&lt;img title=&quot;Biometric-data-executive-cybersecurity-UK-GetApp-HEADER&quot; alt=&quot;hackers try to access a UK business mobile phone&quot; class=&quot;aligncenter&quot; fetchpriority=&quot;high&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/2NBZv3FBebdLOiUNz9Bt8E/c8c80c3af4869b6a30de83a2b1bb6e57/Biometric-data-executive-cybersecurity-UK-GetApp-HEADER.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/2NBZv3FBebdLOiUNz9Bt8E/c8c80c3af4869b6a30de83a2b1bb6e57/Biometric-data-executive-cybersecurity-UK-GetApp-HEADER.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/2NBZv3FBebdLOiUNz9Bt8E/c8c80c3af4869b6a30de83a2b1bb6e57/Biometric-data-executive-cybersecurity-UK-GetApp-HEADER.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/2NBZv3FBebdLOiUNz9Bt8E/c8c80c3af4869b6a30de83a2b1bb6e57/Biometric-data-executive-cybersecurity-UK-GetApp-HEADER.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/2NBZv3FBebdLOiUNz9Bt8E/c8c80c3af4869b6a30de83a2b1bb6e57/Biometric-data-executive-cybersecurity-UK-GetApp-HEADER.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/2NBZv3FBebdLOiUNz9Bt8E/c8c80c3af4869b6a30de83a2b1bb6e57/Biometric-data-executive-cybersecurity-UK-GetApp-HEADER.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;div class=&quot;table-of-contents&quot;&gt;&lt;h2 class=&quot;h3&quot;&gt;In this article&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;#Canadian-IT-professionals-have-doubts-about-biometric-security-methods&quot; class=&quot;event&quot; data-evna=&quot;engagement_facet_click&quot; data-evcmp=&quot;table-of-contents&quot; data-evdst=&quot;jump-to_section&quot; data-evdtl=&quot;text-link_section-name&quot;&gt;Canadian IT professionals have doubts about biometric security methods&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#Deepfake-response-plans-are-catching-on-in-Canada-but-is-it-fast-enough&quot; class=&quot;event&quot; data-evna=&quot;engagement_facet_click&quot; data-evcmp=&quot;table-of-contents&quot; data-evdst=&quot;jump-to_section&quot; data-evdtl=&quot;text-link_section-name&quot;&gt;Deepfake response plans are catching on in Canada, but is it fast enough?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#7-cheap-and-easy-fixes-to-enhance-Canadian-company-cybersecurity&quot; class=&quot;event&quot; data-evna=&quot;engagement_facet_click&quot; data-evcmp=&quot;table-of-contents&quot; data-evdst=&quot;jump-to_section&quot; data-evdtl=&quot;text-link_section-name&quot;&gt;7 cheap and easy fixes to enhance Canadian company cybersecurity&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#Preparation-is-better-than-panic&quot; class=&quot;event&quot; data-evna=&quot;engagement_facet_click&quot; data-evcmp=&quot;table-of-contents&quot; data-evdst=&quot;jump-to_section&quot; data-evdtl=&quot;text-link_section-name&quot;&gt;Preparation is better than panic&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;Cybersecurity measures for businesses are always evolving. As newer threats using AI breakthrough into the mainstream, companies are adapting to cover risks like deepfakes and their capacity to outwit biometric protections. That was a key finding in GetApp’s Executive Cybersecurity Survey*, which studied the responses of 2,648 IT and cybersecurity professionals globally, including 235 Canadian respondents.&lt;/p&gt;&lt;p&gt;This is leading some businesses to rethink their ways to ensure cyber protection including those previously thought unbreakable like biometric access. Companies should aim to weather potential threats from newer technologies by setting up security provisions, from &lt;a href=&quot;/directory/480/network-monitoring/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;network monitoring&lt;/a&gt; to &lt;a href=&quot;/directory/266/training/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;company training&lt;/a&gt;.&lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;&lt;svg viewbox=&quot;0 0 26 28&quot; aria-hidden=&quot;true&quot; class=&quot;icon icon-star box-header__icon align-middle mb-1 me-2&quot;&gt;&lt;path d=&quot;M26 10.109c0 0.281-0.203 0.547-0.406 0.75l-5.672 5.531 1.344 7.812c0.016 0.109 0.016 0.203 0.016 0.313 0 0.406-0.187 0.781-0.641 0.781-0.219 0-0.438-0.078-0.625-0.187l-7.016-3.687-7.016 3.687c-0.203 0.109-0.406 0.187-0.625 0.187-0.453 0-0.656-0.375-0.656-0.781 0-0.109 0.016-0.203 0.031-0.313l1.344-7.812-5.688-5.531c-0.187-0.203-0.391-0.469-0.391-0.75 0-0.469 0.484-0.656 0.875-0.719l7.844-1.141 3.516-7.109c0.141-0.297 0.406-0.641 0.766-0.641s0.625 0.344 0.766 0.641l3.516 7.109 7.844 1.141c0.375 0.063 0.875 0.25 0.875 0.719z&quot;&gt;&lt;/path&gt;&lt;/svg&gt;Key insights&lt;/div&gt;&lt;ul&gt;&lt;li&gt;While 95% say they are satisfied with the results of using biometrics in their company’s security infrastructure, 54% of Canadian IT and cybersecurity professionals identify privacy concerns as a major challenge of using biometric authentication. &lt;/li&gt;&lt;li&gt;57% say their companies have a dedicated plan for dealing with cybersecurity threats such as AI-generated deepfake fraud.&lt;/li&gt;&lt;li&gt;75% of Canadian businesses surveyed have increased their company’s cybersecurity investments over the past 18 months.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&quot;Canadian-IT-professionals-have-doubts-about-biometric-security-methods&quot;&gt;Canadian IT professionals have doubts about biometric security methods&lt;/h2&gt;&lt;p&gt;Biometric authentication has been around for many years and has become the default way to confirm identity for many types of software and hardware worldwide. However, it appears that Canadian companies have doubts about its use compared to other countries.&lt;/p&gt;&lt;p&gt;Our data showed that companies in Canada are less likely than many peer countries, such as the U.S. and the U.K., to enforce the use of biometric authentication. Just under half (49%) of Canadian respondents work in companies that require the use of biometrics compared with a global average of 53%. Additionally, less than a quarter of Canadians surveyed (24%) work in a company where biometrics are offered as an optional cybersecurity measure.&lt;/p&gt;&lt;img title=&quot;biometric-types-executive-cybersecurity-CA-GA-INFOGRAPHIC-1&quot; alt=&quot;Graphic showing how biometric access is granted in Canadian companies&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/2vrMCJ9iRpVPziAAb6tuuN/9fdd46d5682574f5811482c835fff074/biometric-types-executive-cybersecurity-CA-GA-INFOGRAPHIC-1.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/2vrMCJ9iRpVPziAAb6tuuN/9fdd46d5682574f5811482c835fff074/biometric-types-executive-cybersecurity-CA-GA-INFOGRAPHIC-1.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/2vrMCJ9iRpVPziAAb6tuuN/9fdd46d5682574f5811482c835fff074/biometric-types-executive-cybersecurity-CA-GA-INFOGRAPHIC-1.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/2vrMCJ9iRpVPziAAb6tuuN/9fdd46d5682574f5811482c835fff074/biometric-types-executive-cybersecurity-CA-GA-INFOGRAPHIC-1.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/2vrMCJ9iRpVPziAAb6tuuN/9fdd46d5682574f5811482c835fff074/biometric-types-executive-cybersecurity-CA-GA-INFOGRAPHIC-1.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/2vrMCJ9iRpVPziAAb6tuuN/9fdd46d5682574f5811482c835fff074/biometric-types-executive-cybersecurity-CA-GA-INFOGRAPHIC-1.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;The vast majority (95%) of Canadian professionals using biometric authentication systems are satisfied, suggesting their ease of use and accuracy in identification may be proving a boon to businesses.&lt;/p&gt;&lt;p&gt;Despite the positive assessments, users still highlight concerns. Many of the issues noted are longstanding concerns, such as uneasiness over privacy, cost, and user acceptance. These are all fundamental factors that arise from the implementation of biometrics, suggesting Canadian IT professionals could be slightly more skeptical of these tools from the get-go.  However, over a third (37%) of Canadian IT professionals using these systems highlight the risk of identity theft as a worry.&lt;/p&gt;&lt;img title=&quot;challenges-biometrics-CA-GA-INFOGRAPHIC-1&quot; alt=&quot;Concerns of Canadian IT professionals&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/5e6Xwf2sn2JNSb3CjEeuLW/e38980f40da0627738d70dc9c5fd4fc9/challenges-biometrics-CA-GA-INFOGRAPHIC-1.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/5e6Xwf2sn2JNSb3CjEeuLW/e38980f40da0627738d70dc9c5fd4fc9/challenges-biometrics-CA-GA-INFOGRAPHIC-1.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/5e6Xwf2sn2JNSb3CjEeuLW/e38980f40da0627738d70dc9c5fd4fc9/challenges-biometrics-CA-GA-INFOGRAPHIC-1.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/5e6Xwf2sn2JNSb3CjEeuLW/e38980f40da0627738d70dc9c5fd4fc9/challenges-biometrics-CA-GA-INFOGRAPHIC-1.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/5e6Xwf2sn2JNSb3CjEeuLW/e38980f40da0627738d70dc9c5fd4fc9/challenges-biometrics-CA-GA-INFOGRAPHIC-1.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/5e6Xwf2sn2JNSb3CjEeuLW/e38980f40da0627738d70dc9c5fd4fc9/challenges-biometrics-CA-GA-INFOGRAPHIC-1.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;While 73% of Canadian respondents use biometric authentication in some capacity, they also have the highest levels of anxiety about emerging threats such as deepfakes. To illustrate, 78% of Canadian respondents (above the global average of 73%) express concerns about the potential of AI to be used for biometric identity fraud, such as the creation of synthetic fingerprints, facial images, or voices.&lt;/p&gt;&lt;p&gt;However, it might be too soon to predict the end of biometric security measures just yet. As shown before, they often prove successful when implemented and can definitely provide a stronger layer of authentication than many other identification methods. That said, with trust in biometrics starting from a low point in Canadian companies, newer threats spurred on by generative AI could slow its future adoption in the country.&lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;Biometrics aren’t bullet-proof; Ensure multiple layers of protection&lt;/div&gt;&lt;p&gt;While businesses have to rethink using biometric security steps, they are still considered valuable to bolster security. Nevertheless, businesses shouldn’t rely on them solely, or indeed any authentication measure without a failsafe.&lt;/p&gt;&lt;p&gt;This was recently demonstrated by the data breach affecting 500 million Ticketmaster users. In this cybersecurity incident, the attack succeeded because the company’s cloud provider had not enforced multi-step authentication for all of their users. [1]&lt;/p&gt;&lt;p&gt;Therefore, it is vital to ensure that &lt;a href=&quot;/directory/3814/multi-factor-authentication/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;multi-factor authentication (MFA)&lt;/a&gt; is used and enforced at the company level to keep every staff member properly secured. &lt;/p&gt;&lt;/div&gt;&lt;h2 id=&quot;Deepfake-response-plans-are-catching-on-in-Canada-but-is-it-fast-enough&quot;&gt;Deepfake response plans are catching on in Canada, but is it fast enough?&lt;/h2&gt;&lt;p&gt;As cybersecurity attacks such as deepfakes embed themselves in the public consciousness, companies should take quick and decisive preparatory action to address the threat.&lt;/p&gt;&lt;p&gt;It is always important to have a crisis plan in place for many cybersecurity risks. However, this plan must evolve to cover new and developing threats. Companies need to factor in how a deepfake attack could unfold and how they could react if it has any margin of success. &lt;/p&gt;&lt;p&gt;Thus far, more than half (57%) of Canadian professionals surveyed work in companies with a dedicated deepfake response plan. However, this is below the global average of 60%, suggesting Canadians have some catching up to do on this front.&lt;/p&gt;&lt;p&gt;Companies are taking many different approaches to prepare themselves against cyberattacks. Overall, Canada stands a little behind the global curve in this survey as demonstrated in the graph below. On the other hand, the country also appears strong in measures such as awareness training, suggesting that local businesses may prove better prepared than others in peer countries. &lt;/p&gt;&lt;img title=&quot;deepfake-safeguards-CA-GetApp-INFOGRAPHIC-3&quot; alt=&quot;Deepfake prevention methods used in Canadian companies&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/3abqDCrmUmfWknrg029avh/cd7da2d76d28a41ba5e880ca804ef3d2/deepfake-safeguards-CA-GetApp-INFOGRAPHIC-3.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/3abqDCrmUmfWknrg029avh/cd7da2d76d28a41ba5e880ca804ef3d2/deepfake-safeguards-CA-GetApp-INFOGRAPHIC-3.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/3abqDCrmUmfWknrg029avh/cd7da2d76d28a41ba5e880ca804ef3d2/deepfake-safeguards-CA-GetApp-INFOGRAPHIC-3.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/3abqDCrmUmfWknrg029avh/cd7da2d76d28a41ba5e880ca804ef3d2/deepfake-safeguards-CA-GetApp-INFOGRAPHIC-3.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/3abqDCrmUmfWknrg029avh/cd7da2d76d28a41ba5e880ca804ef3d2/deepfake-safeguards-CA-GetApp-INFOGRAPHIC-3.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/3abqDCrmUmfWknrg029avh/cd7da2d76d28a41ba5e880ca804ef3d2/deepfake-safeguards-CA-GetApp-INFOGRAPHIC-3.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;&lt;svg viewbox=&quot;0 0 16 16&quot; aria-hidden=&quot;true&quot; class=&quot;icon icon-lightbulb box-header__icon align-middle mb-1 me-2&quot;&gt;&lt;path fill-rule=&quot;evenodd&quot; clip-rule=&quot;evenodd&quot; d=&quot;M4.98035 14.5098C4.98035 14.1776 5.24966 13.9083 5.58186 13.9083H10.5491C10.8813 13.9083 11.1506 14.1776 11.1506 14.5098C11.1506 14.842 10.8813 15.1113 10.5491 15.1113H5.58186C5.24966 15.1113 4.98035 14.842 4.98035 14.5098Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;path fill-rule=&quot;evenodd&quot; clip-rule=&quot;evenodd&quot; d=&quot;M4.98035 13.5164C4.98035 13.1842 5.24966 12.9149 5.58186 12.9149H10.5491C10.8813 12.9149 11.1506 13.1842 11.1506 13.5164C11.1506 13.8486 10.8813 14.1179 10.5491 14.1179H5.58186C5.24966 14.1179 4.98035 13.8486 4.98035 13.5164Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;path fill-rule=&quot;evenodd&quot; clip-rule=&quot;evenodd&quot; d=&quot;M8.06549 1.20301C5.38001 1.20301 3.20301 3.38001 3.20301 6.06549C3.20301 7.44115 3.7735 8.68254 4.69241 9.56779C4.9541 9.81989 5.20656 10.1313 5.37115 10.5134L5.97769 11.9214H10.1533L10.7598 10.5134C10.9244 10.1313 11.1769 9.81989 11.4386 9.56779C12.3575 8.68254 12.928 7.44115 12.928 6.06549C12.928 3.38001 10.751 1.20301 8.06549 1.20301ZM2 6.06549C2 2.71561 4.71561 0 8.06549 0C11.4154 0 14.131 2.71561 14.131 6.06549C14.131 7.7813 13.4177 9.33156 12.2732 10.4342C12.0857 10.6148 11.9469 10.7985 11.8647 10.9893L11.1015 12.7609C11.0065 12.9815 10.7893 13.1244 10.5491 13.1244H5.58186C5.34164 13.1244 5.12446 12.9815 5.02943 12.7609L4.26629 10.9893C4.18411 10.7985 4.0453 10.6148 3.85778 10.4342C2.71323 9.33156 2 7.7813 2 6.06549Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;path d=&quot;M5.58186 15.0065H10.5491L10.3184 15.468C10.1554 15.794 9.82212 16 9.45759 16H6.67338C6.30885 16 5.9756 15.794 5.81258 15.468L5.58186 15.0065Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;/svg&gt;Signs you might be talking to a deepfake&lt;/div&gt;&lt;p&gt;Deepfake technology is often used for nefarious purposes. Hence, it is important to know how to figure out if you’re being scammed. Some common features of deepfake videos include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Jerky unnatural body movement &lt;/li&gt;&lt;li&gt;Blurring around facial features&lt;/li&gt;&lt;li&gt;Unnatural eye movements&lt;/li&gt;&lt;li&gt;Unusual coloration&lt;/li&gt;&lt;li&gt;Inconsistent audio&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Additionally, if you are in doubt about the person you are speaking to, you can easily spot discrepancies by asking them to turn their heads 90° to the side to see a profile view of their face. This method to help prevent deepfakes can disrupt the software algorithm that projects another face onto the speaker as it has to adapt to a shape it is not as used to working with.&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&quot;7-cheap-and-easy-fixes-to-enhance-Canadian-company-cybersecurity&quot;&gt;7 cheap and easy fixes to enhance Canadian company cybersecurity&lt;/h2&gt;&lt;p&gt;Emerging cyberthreats and technologies are pushing companies to enhance investments to ensure advanced cybersecurity checks. This is reflected in the sample we surveyed in Canada, with 75% of respondents saying their firms have raised investment in cybersecurity over the last 18 months. &lt;/p&gt;&lt;p&gt;However, companies can adopt numerous security vulnerability fixes to improve their defenses relatively quickly without spending much on deployment.&lt;/p&gt;&lt;p&gt;For instance, we noted that Canadian respondents working in companies that have been hit by cyberattacks in the 18 months prior focus on simple but essential responses, as the graph below indicates. &lt;/p&gt;&lt;img title=&quot;cyber-prevention-methods-post-attack-CA-GA-INFOGRAPHIC-4 (1)&quot; alt=&quot;How Canadian companies are counteracting breaches that succeeded in the last 18 months&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/5s6ymW6xxQQs6CkzS4kxFn/e91f28d87575ca4f941b3510605c6221/cyber-prevention-methods-post-attack-CA-GA-INFOGRAPHIC-4__1_.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/5s6ymW6xxQQs6CkzS4kxFn/e91f28d87575ca4f941b3510605c6221/cyber-prevention-methods-post-attack-CA-GA-INFOGRAPHIC-4__1_.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/5s6ymW6xxQQs6CkzS4kxFn/e91f28d87575ca4f941b3510605c6221/cyber-prevention-methods-post-attack-CA-GA-INFOGRAPHIC-4__1_.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/5s6ymW6xxQQs6CkzS4kxFn/e91f28d87575ca4f941b3510605c6221/cyber-prevention-methods-post-attack-CA-GA-INFOGRAPHIC-4__1_.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/5s6ymW6xxQQs6CkzS4kxFn/e91f28d87575ca4f941b3510605c6221/cyber-prevention-methods-post-attack-CA-GA-INFOGRAPHIC-4__1_.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/5s6ymW6xxQQs6CkzS4kxFn/e91f28d87575ca4f941b3510605c6221/cyber-prevention-methods-post-attack-CA-GA-INFOGRAPHIC-4__1_.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;The priorities listed above can be essential for good cybersecurity health and in many cases can be implemented cost-effectively. To ensure Canadian companies ensure proper protection from both conventional threats and newer more technologically advanced risks, we’ve highlighted seven measures that companies could deploy:&lt;/p&gt;&lt;h3&gt;1. Develop a deepfake plan&lt;/h3&gt;&lt;p&gt;Whilst many in our sample have a deepfake plan in place, a good deal (43%) of companies in Canada don’t have it or are unsure about it. For those without a plan, it is important to rectify the situation.&lt;/p&gt;&lt;p&gt;The plan itself should ideally examine ways to strengthen protection against deepfake attacks by prioritizing staff &lt;a href=&quot;/directory/1035/cybersecurity/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;cybersecurity awareness&lt;/a&gt; and &lt;a href=&quot;/directory/3809/security-awareness-training/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;training&lt;/a&gt;. Additionally, it is important to prepare a crisis plan that details steps to take should an attack begin to succeed so proper procedures are in place.&lt;/p&gt;&lt;h3&gt;2. Provide multiple layers of protection&lt;/h3&gt;&lt;p&gt;As evidenced by recent deepfake fraud and cyberattacks, having multi-factor authentication (MFA) on your systems is key. This ensures that if one form of identification and authentication is breached, there are at least others that could withstand a threat.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/directory/3814/multi-factor-authentication/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;MFA software&lt;/a&gt; is an important inclusion to achieve this. This might involve passwords, memorable information, or even biometrics. Whilst we’ve seen concerns about the security of biometrics, they still offer a great deal of protection and should be considered for at least one step of authentication. When selecting a viable system, it can help to look out for software providers who offer features such as enhanced fraud detection and low-code integrations.&lt;/p&gt;&lt;h3&gt;3. Audit security at a network level&lt;/h3&gt;&lt;p&gt;At a time when new threats such as deepfakes are rising in profile, it is vital to review your company&amp;#39;s network security. Any vulnerabilities in this infrastructure could easily allow a cyberattack to succeed. We found that this was a major priority for Canadian businesses with 53% of our sample whose senior execs were targeted by cyberattackers. This is key to underpinning security.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/directory/1443/network-security/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Network security software&lt;/a&gt; should be standard in every company. It protects against cyberattacks and data loss by detecting and blocking threats such as viruses, malware, and unauthorized access. It also improves network integrity and availability, creating a more stable and secure IT infrastructure.&lt;/p&gt;&lt;h3&gt;4. Enforce software update schedules&lt;/h3&gt;&lt;p&gt;Leaving software unpatched can have severe security consequences. 45% of the professionals we surveyed in Canada working in businesses targeted by a cyber breach in the last 18 months are now making software updates a priority.&lt;/p&gt;&lt;p&gt;Businesses can benefit from deploying &lt;a href=&quot;/directory/1125/patch-management/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;patch management software&lt;/a&gt; that scans software for updates and ensures they are automatically updated. This will ensure that your tech stack remains fully patched, updated, and secure with the latest security protections.&lt;/p&gt;&lt;h3&gt;5. Strengthen password policies&lt;/h3&gt;&lt;p&gt;A good password policy is a company-wide concern. This is an ever-more-important issue to ensure each step of security is up to the challenge of today’s technical landscape, especially as trust in biometric verification drops. Moreover, a strong password policy will only get more vital as AI tools emerge that can crack passwords with greater ease. [2]&lt;/p&gt;&lt;p&gt;Implementing &lt;a href=&quot;/directory/3797/self-service-password-reset-sspr/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;self-service password reset (SSPR) software&lt;/a&gt; tools can be useful in this regard. They can help ensure staff regularly update their passwords and set parameters for the complexity of a password.&lt;/p&gt;&lt;h3&gt;6. Provide enough training to executives&lt;/h3&gt;&lt;p&gt;Executives are a prize target for scammers due to their levels of access and oversight of major transactions and decisions in a company. New threats, such as deepfakes, require extra commitment to this goal.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/directory/3809/security-awareness-training/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Security awareness training software&lt;/a&gt; can prove practical for executives and other staff, offering up-to-date guidance on spotting and responding to the latest threats.  &lt;/p&gt;&lt;h3&gt;7. Encrypt data appropriately&lt;/h3&gt;&lt;p&gt;Unprotected data makes your business an easy target for attacks. Therefore, ensuring that business data is stored and shared securely is essential.&lt;/p&gt;&lt;p&gt;Having a strong &lt;a href=&quot;/directory/472/encryption/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;data encryption solution&lt;/a&gt; is key. This makes the data harder to access and interpret without the right authorization, so even if a hacker gets away with information, they may not be able to use it.&lt;/p&gt;&lt;h2 id=&quot;Preparation-is-better-than-panic&quot;&gt;Preparation is better than panic&lt;/h2&gt;&lt;p&gt;There’s no doubt that new threats, such as deepfakes, which can undermine biometric protection, are a cause for concern. However, there is much that can be done to face up to the threat.&lt;/p&gt;&lt;p&gt;Extra preparedness needs to be an active focus across a business and should apply to all employees regardless of their position in the business. In our next report, &lt;a href=&quot;https://www.getapp.ca/blog/6877/canadian-executives-corporate-identity-threat-protection-tips&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;we will investigate this in greater detail&lt;/a&gt; and study how companies can do more to protect senior leadership from becoming a target for a cyberattack.&lt;/p&gt;&lt;div class=&quot;box-idea&quot;&gt;Looking for &lt;a href=&quot;/directory/480/network-monitoring/software&quot; rel=&quot;noopener noreferrer&quot; class=&quot;event&quot; data-evna=&quot;engagement_facet_click&quot; data-evcmp=&quot;blog-idea&quot; data-evdst=&quot;go-to_category-page&quot; data-evdtl=&quot;text-link_category-name&quot; target=&quot;_blank&quot;&gt;network monitoring software&lt;/a&gt;? Check out our catalogue.&lt;/div&gt;&lt;p&gt;&lt;/p&gt;","dateModified":"2024-09-05T08:39:47.000000Z","datePublished":"2024-08-26T18:01:13.000000Z","headline":"Over half of Canadian companies have a deepfake response plan in the wake of rising cyberthreats","inLanguage":"en-CA","mainEntityOfPage":"https://www.getapp.ca/blog/6866/cybersecurity-measures-canadian-business-deepfake-plan#webpage","publisher":{"@id":"https://www.getapp.ca/#organization"}}]}
</script>
