COMMENTARY: The 2024 Verizon Data Breach Investigations Report found that 68% of breaches involved a non-malicious human element, but this isn't just about individual employees making mistakes. It represents a massive vulnerability that's costing enterprises billions in lost data, fraudulent transactions, and broken consumer trust.While cybercriminals traditionally focused on breaking through technical defenses, they've now transformed their approach to simply logging in using compromised credentials. They're weaponizing social engineering, phishing, and deepfakes — now supercharged by Generative AI (GenAI) — to exploit human touchpoints across the enterprise at unprecedented scale. Every compromised employee account becomes a gateway to sensitive systems, customer data, and financial assets.[SC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Read more Perspectives here.]Traditional security infrastructure technology — firewalls, endpoint protection, password policies —wasn't built for this evolution. These systems can't detect when a criminal uses valid credentials obtained through social engineering to access customer records, initiate wire transfers, or exfiltrate intellectual property. The business impact has been staggering: In 2023 alone, enterprises lost $2.9 billion to business email compromise (BEC) attacks. Major brands saw their stock prices plummet after massive data breaches started with a single phished employee. And the reputational damage from losing customer data has become almost impossible to recover from in an era of eroding digital trust.For enterprises to protect their assets, customers and reputation, they must implement continuous identity assurance across every business process — from employee onboarding to high-risk transactions.Automated phishing at scale: GenAI has transformed phishing from a manual effort into a highly automated operation. Attackers can now instantly generate thousands of context-aware messages that perfectly mirror a company's communication style, internal processes, and executive writing patterns. These are sophisticated campaigns that adapt to an organization's specific language and workflows. When a single convincing message can compromise an employee account and lead to enterprise-wide damage, this ability to rapidly produce and refine attacks represents a serious escalation of risk. Enhanced social engineering: GenAI has made social engineering attacks drastically more convincing through synthetic media. Attackers can now supplement their phishing campaigns with fake video calls where an AI-generated "executive" requests urgent wire transfers, or voicemails that sound exactly like a known vendor asking for system access. These are multi-channel attacks that leverage realistic synthetic voices, photos, and videos to make their social engineering more persuasive. When an employee receives what appears as a video message from their CEO or a voice call from a trusted colleague, it’s possible to deceive even security-trained staff. Integrate automated identity verification into critical workflows: High-risk moments—like onboarding, account recovery, password resets, and privileged events such as accessing sensitive systems—are prime opportunities for attackers. Embedding identity verification directly into these workflows ensures only legitimate users gain access. Look for tools that integrate effortlessly with existing systems to secure operations without adding unnecessary complexity or operational burden to internal teams. Adopt multiple verification methods: Passwords alone aren’t enough to protect an organization. Combine methods like government ID checks, biometric verification (selfies), and database cross-referencing to confirm identities with confidence. To balance security with usability, employ adaptive step-up verification—adding extra checks only when risk signals demand it. This approach keeps friction low for legitimate users while blocking potential attackers. Defend against deepfakes and fraud with behavioral risk analysis: Deploy verification to validate submitted information and corroborate it with observable evidence from behavioral signals and contextual data. Then use advanced link analysis across the workforce to spot suspicious patterns that could indicate coordinated attacks. This layered, intelligent approach stops sophisticated impersonation attempts while keeping the employee experience smooth. Align with security and compliance standards: A company’s security strategy should also align with regulatory requirements like NIST IAL2. Meeting these standards ensures compliance, and also adds another layer of trust and protection against identity-based attacks. Enterprises can protect their workforce and critical systems without creating unnecessary barriers, striking the perfect balance between security and usability.Today's criminals use AI-powered social engineering to target the workforce, striking during critical business moments to steal data and drain funds through convincing impersonation attacks.Strengthening identity verification means protecting the bottom line. By embedding intelligent verification into important workflows, organizations can stop sophisticated impersonation attempts before they result in costly breaches or fraud, while giving Infosec teams more data and time to stay on top of emerging threats.Today, a single successful attack can lead to millions in losses. That's why companies need to implement intelligent identity verification to protect the organization's assets and prevent devastating financial damage.Rick Song, chief executive officer, Persona SC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.
Identity, Decentralized identity and verifiable credentials, Phishing
Identity verification: The front line to workforce security

(Adobe Stock)
An In-Depth Guide to Identity
Get essential knowledge and practical strategies to fortify your identity security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds