Scammers always rely on deception to trick people out of their money, but the sudden wide availability of artificial intelligence has increased the convincingness of their schemes. AI can be used to clone voices and even create deepfake videos, so we all need to be vigilant about any incoming communication, from emails and texts to calls and FaceTimes. These tools allow criminals to replicate the voices of family members, coworkers, and even government officials with eerie accuracy. All that is required is a short
audio or video clip.

However, by creating a safe word as a preventative measure, you can stop AI-empowered scams in their tracks.

How audio cloning scams and deepfakes work

A common AI scam starts with a distressed call or voice message from a loved one – or, at least, someone speaking in your loved one’s voice. Video calls with a “deepfake” can also happen, meaning the scammers use AI to replicate both video and audio of one of your contacts. The voice on the other end might say they’ve been in an accident, are in legal trouble, or need urgent financial help. Because the voice sounds exactly like your child, spouse, or boss, your instinct is to react immediately and not think before you take action. In just a few moments, you’ve fallen victim to the scam by taking actions like wiring money or sharing sensitive data.

HOW SCAMMERS CREATE DEEPFAKES

With just a short audio sample—taken from social media, voicemail recordings, or even a quick phone call— criminals can generate fake messages that sound exactly like someone you trust. The same works for video deepfakes. There might be a significant amount of video footage of yourself posted online. Today’s AI systems only need around 30 seconds of audio and video data to create convincing clones.

Establish a safe word to keep your family safe

A safe word is a pre-agreed code word or phrase only you and your trusted group know. If you ever receive an urgent call or message, asking for the safe word is a quick way to verify the person’s identity.

#image_title

WHO SHOULD HAVE A SAFE WORD?

Safe words aren’t just for families, they can be useful in many settings. Here are some groups that should consider setting up a safe word system:

  • Families: Parents and children can use safe words to verify identity in emergency situations or potential kidnapping scams (commonly called grandparent scams).
  • Coworkers and teams: Businesses can establish safe words to confirm financial transactions, sensitive information requests, or urgent company-wide messages.
  • Close friends: Friends can also have a verification system in place, especially if one is traveling or in a vulnerable situation.
  • Elderly adults and their caregivers: Scammers often target older adults, so having a safe word b tween an elderly person and their trusted family or caregivers is critical.
  • Online communities and groups: Any organization that relies on virtual communication can benefit from a safe word to prevent impersonation, especially if the group has access to sensitive personal data.

HOW TO SET UP A SAFE WORD SYSTEM TO DEFEND AGAINST AI

  1. Make it unique. Pick a word, phrase, or question that wouldn’t be easy for an outsider to guess. Avoid common passwords, birthdays, or pet names. Inside jokes are ok if they are indeed impossible for an outside party to understand.
  2. Keep it private. Share your safe word in person or via a secure, encrypted channel. Never post it online or discuss it in public settings. You can store a safe word in your encrypted password manager vault. If anyone posts a hint for the safe word online, even if it wasn’t intentional, change the safe word.
  3. Use multiple safe words, but make them each special. While families should have a safe word, workplaces can benefit, too. Coworkers and teams should establish verification codes for sensitive or financial requests. Don’t use the same safe word among multiple groups, however.
  4. Practice using the safe word. Like any security measure, a safe word only works if people remember to use it.

Occasionally test your safe word system to make sure everyone involved recalls the procedure. Testing it doesn’t have to be scary, it could be a regular game.

Extra verification steps

While a safe word is an excellent first line of defense, here are additional ways to verify someone’s identity:

  • Call back using a trusted number: Hang up and call the person back using a known number stored in your contacts.

Hackers can spoof phone numbers so you should call back from the phone number you have stored, even if the person on the other end begs you to stay on the line.

  • Video verification: Ask to switch to a video call if possible. While video deepfakes can happen, it is less likely that a scammer has both a video deepfake and an audio clone created. Even still, ask for your safe word.
  • Ask personal questions: Have a secondary verification method, like a question only the real person would know the answer to. This can help you verify the person beyond a single safe word or phrase.

Don’t panic and Stay Safe Online

Deepfake scams are sophisticated, but you can keep your head calm and take precautions like safe words.

A safe word is a simple, powerful, and very human tool anyone can use to verify identity and prevent scams.

Whether with your family, friends, or coworkers, take the time today to establish a safe word because it’s our best defense against AI-powered scams.

You need a safe word!

Special thanks to StaySafeOnline.org for this information!

Public Wi-Fi is everywhere – coffee shops, airports, hotels, trains. It’s super convenient, especially for busi-ness travelers or anyone working remotely.
But what if we told you that hopping on that free Wi-Fi could expose your business data to cyber criminals? That’s the reality of using unsecured public networks.
When you connect to public Wi-Fi, you’re opening the door to scammers who know how to exploit these networks. The two biggest threats you need to know about are called Man-in-the-Middle (MITM) attacks and Evil Twin attacks.
Yes, they sound like something out of a spy movie… but they’re very real and can have serious consequences for your business.

Let’s start with Man-in-the-Middle (MITM) attacks. You’re sitting in a coffee shop, sending an email or logging in to your business bank account. You think your device is communicating directly with the Wi-Fi network, but in reality, a cybercriminal has inserted themself between you and the network.
This “man in the middle” can see everything you’re doing – your passwords, your emails, even your credit card details. And the worst part? You probably won’t even notice it’s happening.
Criminals use this stolen information in all sorts of ways. They might sell it to advertisers, use it to imper-sonate you in phishing scams (where they trick people into sharing sensitive information, like passwords or credit card details). Or even steal money from your accounts. For businesses, this could mean sensitive fi-nancial information or customer data ending up in the wrong hands.

Now let’s talk about Evil Twin attacks.  see two Wi-Fi networks: One called “Airport Free Wi-Fi” and another called “Airport Wi-Fi Secure”. They both sound legit, but one of them could be a fake network set up by cyber criminals.
When you connect to the fake network, scammers can monitor everything you do online, just like in a MITM attack – but they can go even further. They can steal your cookies (little bits of data that websites use to remem-ber you) and gain access to things like your login details or personal information.
In some cases, they can even install malware (malicious software) on your device without you clicking a sin-gle thing. Scary, right? All it takes is connecting to the wrong Wi-Fi network, then your data – and your business’s security – could be compromised.
Using public Wi-Fi doesn’t have to be a security nightmare, but you do need to be cautious. Here are some steps you can take to help keep your business protected:
• Avoid accessing sensitive information while connected to public Wi-Fi. This includes anything involving passwords, personal data, or financial accounts. If you wouldn’t want a stranger looking over your shoulder, it’s best to save it for when you’re on a secure network.
• Stick to websites that use HTTPS, which encrypts your data. You’ll know a site is secure if you see a pad-lock icon in the address bar or “https://” at the beginning of the web address. Most websites use this today.
• Consider using trusted browser extensions designed to boost your online safety. Many can block cook-ies, ads, and even malicious websites, reducing the risk of your information being exposed.
• Turn off auto-join on your business devices. This stops your work phone, tablet, or laptop from auto-matically connecting to any available network, including potentially dangerous ones.
• Be wary of suspicious pop-ups. Scammers often use these to trick you into clicking something mali-cious. If a pop-up feels wrong, don’t interact with it – just close the window.
• Enable two-factor authentication (2FA) on your business accounts whenever possible. This requires a second form of identification (like a code sent to your phone) to log you in, which makes it harder for any-one to break in even if they get hold of your password.
• Finally, keep your software up to date. Updates often include security patches that protect your device from the latest threats. Ignoring them could leave your business devices vulnerable.
A little caution goes a long way when it comes to keeping your business protected online. Ask yourself: Is the convenience of free Wi-Fi worth the risk of exposing my data?
This information is from our Weekly Tech Update https://actsmartit.com/2-wifi-threats/

Would you like a print copy of this infographic mailed to you?
Simply fill out the form below

Mail Password Managers Protect

Your Name(Required)
Mailing Address(Required)
May we add you to our mailing list?(Required)