Distinguishing between real and fake video is becoming challenging nowadays. The emergence of deepfake technology is due to the artificial intelligence application in a video or image, to portray an action or speech. Some of AI software could be downloaded and used by the public easily without so much of technical knowledge. With the help of social media platform and peoplès frequent participation in sharing a news or information, deepfake can reach millions of people in a short span of time and create a bad impact to the organization or people involved. There is no exception or accurate prediction on the individual or organisation who will be targeted. This paper will discuss on the impact and potential risk to the organization which have been deepfake video victim. A review on how an organization should handle the situation by considering on risk management, business continuity and disaster recovery actions that should be taken will be discussed besides evaluating the defense techniques in improving the organizational security to prevent from the deepfake ransomware. Lastly, a set of guidelines will be reviewed for the employees in information sharing and awareness towards the deepfakes ransomware.

1.
Kwok
,
A. O.
and
Koh
,
S. G.
(
2020
)
’Deepfake: a social construction of technology perspective’, Current Issues in Tourism
, pp.
1
5
. Available at:
2.
Maras
,
M.-H.
and
Alexandrou
,
A.
(
2019
) ’
Determining authenticity of video evidence in the age of artificial intelligence and in the wake of Deepfake videos
’,
The International Journal of Evidence & Proof
,
23
(
3
), pp.
255
262
.
3.
Cuthbertson
,
A.
(
2018
)
What Is Deepfake Porn? AI Brings Face-Swapping to a Disturbing New Level
. Available at: https://www.newsweek.com/what-deepfake-porn-ai-brings-face-swapping-disturbing-new-level-801328 (Accessed: 20th March 2021).
4.
Soaree
,
B.
(
2019
)
How Deepfakes Can Ruin Your BusinessAnd How You Can Keep Your Organization Safe
. Available at: https://heimdalsecurity.com/blog/deepfakes-can-ruin-your-business/ (Accessed: 20th March 2021).
5.
Wollmann
,
D.
(
2019
)
The Real Danger of Deepfakes
. Available at: https://services.global.ntt/en-us/insights/blog/the-real-danger-of-deepfakes (Accessed: 20th March 2021).
6.
Collins
,
A.
(
2019
)
Forged Authenticity: Governing Deepfake Risks: EPFL International Risk Governance Center (IRGC)
. Available at: https://infoscience.epfl.ch/record/273296?ln=en
7.
Hendrikse
,
R.
(
2019
)
How Deepfakes Could Become A Threat To Your Identity
. Available at: https://www.forbes.com/sites/renehendrikse/2019/12/20/how-deepfakes-could-become-a-threat-to-your-identity/?sh=16f4189e1063 (Accessed: 20th March 2021).
8.
Daly
,
C.
(
2019
)
Why Deepfakes Pose An Unprecedented Threat To Businesses
. Available at: https://aibusiness.com/responsible-ai/why-deepfakes-pose-an-unprecedented-threat-to-businesses (Accessed: 20th March 2021).
9.
Hopkin
,
P.
(
2018
)
Fundamentals of Risk Management: Understanding, Evaluating and Implementing Effective Risk Management
.
Kogan Page Publishers
, pp
49
56
.
10.
Kietzmann
,
J.
,
Lee
,
L. W.
,
McCarthy
,
I. P.
and
Kietzmann
,
T. C.
(
2020
) ’
Deepfakes: Trick or treat?
’,
Business Horizons
,
63
(
2
), pp.
135
146
.
11.
Truepic
(
2021
)
Authenticity infrastructure for the internet
. Available at: https://truepic.com/ (Accessed: 20th March 2021).
12.
Chiu
,
A.
(
2019
)
Facebook wouldn’t delete an altered video of Nancy Pelosi
.
What about one of Mark Zuckerberg ?
Available at: https://www.washingtonpost.com/nation/2019/06/12/mark-zuckerberg-deepfake-facebook-instagram-nancy-pelosi/?noredirect=on (Accessed: 20th March 2021).
13.
Punjaisri
,
K.
and
Wilson
,
A.
(
2017
) ’
The role of internal branding in the delivery of employee brand promise
’,
Advances in corporate branding: Springer
, pp.
91
108
.
14.
Sahebjamnia
,
N.
,
Torabi
,
S. A.
and
Mansouri
,
S. A.
(
2015
) ’
Integrated business continuity and disaster recovery planning: Towards organizational resilience
’,
European Journal of Operational Research
,
242
(
1
), pp.
261
273
.
15.
Crocetti
,
P.
(
2020
)
Create your data backup strategy: A comprehensive guide
. Available at: https://searchdatabackup.techtarget.com/Create-your-data-backup-strategy-A-comprehensive-guide (Accessed: 20th March 2021).
16.
Townsend
,
K.
(
2020
)
Is Backup Alone Enough, or is Full Disaster Recovery Required to Mitigate the Threat of Ransomware?
Available at: https://www.securityweek.com/backup-or-disaster-recovery-protection-against-ransomware (Accessed: 20th March 2021).
17.
Andrade
,
E.
,
Nogueira
,
B.
,
Matos
,
R.
,
Callou
,
G.
and
Maciel
,
P.
(
2017
) ’
Availability modeling and analysis of a disaster-recovery-as-a-service solution
’,
Computing
,
99
(
10
), pp.
929
954
.
18.
Deloitte
(
2019
)
Future of Risk in The Digital Era
. Available at: https://www2.deloitte.com/content/dam/Deloitte/us/Documents/finance/us-rfa-future-of-risk-in-the-digital-era-report.pdf (Accessed: 21st March 2021).
19.
Wong
,
S. Y.
(
2015
)
More firms turning to risk sensing: Survey: The Straits Times
. Available at: https://www.straitstimes.com/business/companies-markets/more-firms-turning-to-risk-sensing-survey (Accessed: 20th March 2021).
20.
Elliott
,
M.
(
2020
)
4 Trending Cyberattacks & How to Protect Against Them in 2020
. Available at: https://blog.newcloudnetworks.com/5-trending-cyberattacks-how-to-protect-against-them-in-2020 (Accessed: 20th March 2021).
21.
Elliott
,
M.
(
2020
)
The Importance of Security as a Service for Remote Workers
. Available at: https://blog.newcloudnetworks.com/topic/secaas (Accessed: 20th March 2021).
22.
Kassner
,
M.
(
2020
)
Cybersecurity pros: Are humans really the weakest link?
Available at: https://www.techrepublic.com/article/cybersecurity-pros-are-humans-really-the-weakest-link/. (Accessed: 21st March 2021).
23.
Kaspersky
(
2019
)
Deepfake and Fake Videos-How to Protect Yourself?
Available at: https://www.kaspersky.com/resource-center/threats/protect-yourself-from-deep-fake (Accessed: 21st March 2021).
24.
Hopkins
,
P.
(
2020
)
How to defend against a ransomware attack
. Available at: https://www.smartbrief.com/original/2020/06/how-defend-against-ransomware-attack (Accessed: 21st March 2021).
25.
Seorg
(
2020
)
Deepfakes: How to Defend Yourself from Attack
. Available at: https://securityboulevard.com/2020/05/deepfakes-how-to-defend-yourself-from-attack/ (Accessed: 21st March 2021).
26.
Sabir
,
E.
,
Cheng
,
J.
,
Jaiswal
,
A.
,
AbdAlmageed
,
W.
,
Masi
,
I.
and
Natarajan
,
P.
(
2019
) ’
Recurrent convolutional strategies for face manipulation detection in videos
’,
Interfaces (GUI)
,
3
(
1
). Available at: https://arxiv.org/pdf/1905.00582.pdf
27.
Westerlund
,
M.
(
2019
) ’
The emergence of deepfake technology: A review
’,
Technology Innovation Management Review
,
9
(
11
).
This content is only available via PDF.
You do not currently have access to this content.