Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/showpost/35048.aspx
INSIGHTS

Countering deepfakes: 5 best practices to follow

Countering deepfakes: 5 best practices to follow
With deepfake and spoofing attacks becoming more frequent, how to protect organizations against these attacks has become important for end users.
With deepfake and spoofing attacks becoming more frequent, how to protect organizations against these attacks has become important for end users. This article looks at some of the best practices that can effectively help users counter deepfake and spoofing threats.
 

Use multifactor authentication

 
Since deepfake and spoofing attacks use faked face, voice or other biometric identities, it’s advisable that users deploy multifactor authentication (MFA) where the “what you have” and “what you know” factors are also employed.
 
“MFA is essential for securing highly restricte...


Product Adopted:
Biometrics
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: