

The New Face of Fraud
Have you ever wondered how easy it would be for someone to impersonate you online? With just a single photo and a few seconds of audio, someone can create a convincing digital version of you that's nearly impossible to tell from the real thing. And cybercriminals are already using this technology to target people just like you.
Deepfakes are getting harder to spot
Today, about 7 out of 10 deepfakes look real enough to fool the average person. That means a video call, a voicemail, or even a short clip online mightnot be what it seems. Imagine your boss asking you for a wire transfer on Teams, or a loved one calling you from the hospital in urgent need of money. These situations feel real, but they may actually be a scammer using deepfake technology. That’s why it’s so important to slow down, double-check, and verify before taking action.
One photo can become your “digital double”
It doesn’t take advanced tools or weeks of work — just one clear photo of you online can be enough to build a realistic talking version of your face. In under an hour, someone could make a deepfake of you giving instructions, resigning from a job, or saying things you’d never say. The photos we casually share on LinkedIn, Instagram, or other platforms can give attackers the keys to impersonate us.
Just 3 seconds of your voice is enough: Your voicemail greeting, a short social media clip, or even a few words captured in the background of a video can be cloned into a voice that sounds exactly like you. From there, a scammer could make “you” authorize a payment, confess to something you didn’t do, or damage your reputation. Every public word you’ve spoken online can be turned into material for fraud.
How to Protect Yourself: Deepfakes aren’t science fiction anymore — they’re here. The good news is that awareness is the first step in protecting yourself. Whenever something feels rushed, emotional, or urgent, pause and verify. A real request will wait; a fake one counts on you moving too fast.
Pause before reacting: Deepfake scams rely on panic and urgency. If something feels rushed or emotional, stop and give yourself a few minutes to think before responding.
Request a live interaction: Ask the person to do something spontaneous in real-time, like wave their hand, say a random word you choose, or turn their head to show their profile. Deepfakes struggle with unexpected requests.
Verify through another channel: If you get a strange request on Zoom, WhatsApp, or email, confirm it through a different method — like a direct phone call, text, or in-person check. Real people won’t mind the extra step.
As deepfake technology evolves, so must our awareness. Stay curious, stay cautious, and keep learning.
OSINT is Open-Source Intelligence, which is the practice of collecting and analyzing information from publicly available sources to produce actionable intelligence. These sources can include websites, social media, news articles, public records, and satellite images.
Think you're sharing smart on social media?
Think again. There's a difference between connecting with your network and oversharing details that put you—and your organization—at risk. From posts that reveal travel plans to profile updates that map organizational relationships, the line between professional visibility and security vulnerability is thinner than you think.
Threat actors use publicly available information to target everyone from entry-level employees to C-suite executives. The more senior your role, the more valuable your information becomes—but everyone's digital footprint creates risk.
Let's explore how to maintain your professional presence without sharing too much, the risks of oversharing, and the smart habits that keep you connected and protected.
Smart professional presence means connecting without compromising security. Here's where sharing crosses the line into oversharing:
The goal isn't to stop sharing—it's to share thoughtfully. Smart sharing lets you stay connected and build your professional brand while staying secure.
How Oversharing Makes Attacks Easier
Your posts provide the puzzle pieces attackers need to target you more effectively. This matters for everyone, but the stakes increase dramatically for those in leadership roles who can approve transactions, access sensitive data, or represent the organization publicly.
Think you'd know if you were being 'phished'? Think again. From fake “unsubscribe” links to AI-generated scams that mimic real brands and websites, phishing attacks are getting smarter—and harder to detect.
Let's break down the tactics behind today’s most convincing phishing threats, what to watch out for, and the habits that can keep you and the Bank safe.
What Is Phishing?
Phishing is a type of social engineering attack where criminals impersonate trusted sources—like your employer or even a friend. The goal is to trick you into:
Phishing attacks take place over SMS, email, phone calls, QR codes, or even work-related chat applications. Attackers thrive on creating urgency or fear to push quick, careless actions.
Smarter Scams with AI
Phishing is getting harder to spot. Scammers now use AI to:
These tactics make phishing attempts more convincing than ever, and as a result you have to more discerning than ever. Remember to always ask yourself: 'would my boss ask this?', 'would my insurance require this information over text?', and 'does this link look the official link online?' If you're hesitant about those questions—or any related questions—don't reply.
How to Stay Safe
1. Pause and Inspect - Always check a sender’s email address or a caller's number—make sure they are who they're claiming to be—and hover over any links you're set before clicking.
2. Don't Share Sensitive Info - Never send passwords to personal data over email, text, or chat service, even if the request seems urgent.
3. Report Suspicious Emails - If something feels off, report it. It's always better to be safe than sorry.
Phishing doesn’t just target inboxes or phone numbers—it targets trust. The best defense is an awareness environment that slows down, inspects, and questions before clicking. In a world of convincing fakes, vigilance is protection.
Cyber security doesn’t stop when you leave your desk. From charging your phone at the airport to shopping online at home, everyday activities can open the door to cyber risks if you’re not careful. With this topic, we’ll explore the hidden threats in daily life and the simple habits that keep your information safe—wherever you are.
Threats You Might Not Recognize:
Hackers can tamper with public USB charging ports in airports, hotels, and cafes—using them to secretly install malware or steal your data.
Best practice: Skip USB ports entirely. Use AC wall outlets with your own charger and cable, bring a portable battery, or use a USB data blocker that prevents data transfer while allowing charging.
Cybercriminals often set up lookalike Wi-Fi networks in hotels, airports, and coffee shops to steal logins or spy on your activity. Even legitimate public networks can expose your data if they’re not properly secured.
Best practice: Avoid logging in to sensitive accounts or entering payment details on public Wi-Fi. If you must connect, use a VPN or stick to generalbrowsing only. Whenever possible, default to your cellular connection for safer access.
Internet-connected gadgets like smart TVs, doorbell cameras, and voice assistants can expose sensitive information if left unsecured. Many ship with weak default passwords like "admin" or "password123" that attackers can easily guess.
Best practice: Change all default passwords to strong, unique ones, and keep device software up to date. Review what data your devices can access and turn off unnecessary features that might compromise privacy.
Low-Lift, High-Impact Security
Not every defense requires advanced tools or hours of training. Some of the most powerful cybersecurity habits are the simplest—and they take just seconds to apply:
These “low-lift” habits take almost no effort, but together they create a strong security baseline that frustrates attackers and protects you everywhere.
Cyber security isn’t just a workplace rule—it’s a life skill. Every device, every network, every purchase is a chance to practice safe habits. Security goes wherever you go.