Tech Insights with Alisha Christian

AI’s New Tricks, Old Scams


Listen Later

How criminals are using AI to scale familiar fraud!

Think you can still spot a scam by bad grammar and odd phrasing? That edge is gone.

We sit down to map how AI has supercharged classic fraud—making phishing emails flawless, internal chat messages feel authentic, and even voicemails sound exactly like your CFO. The twist? These same tools can help you work smarter, if you build the right guardrails and culture around them.

We start with the modern account takeover, where compromised supplier inboxes deliver perfect‑looking document links that quietly steal credentials. From there, we break down mimicry and deepfakes: how a single headshot from a team page, plus a few seconds of public audio, can be turned into convincing video, full‑body movement from reference clips, and multilingual voice clones. This isn’t sci‑fi or enterprise‑only anymore—it’s affordable, fast, and good enough to fool busy teams.

We share pragmatic defences you can apply today: limiting staff photos to low resolution, locking down external access in Teams and Slack, and verifying unusual requests through a channel you initiate.

Culture sits at the centre of resilience. Urgency, authority, and secrecy are an attacker’s favourite levers—and they work best where questions are discouraged. We unpack zero trust in plain terms: verify the user, the device, and the context every time. And we explain why “healthy friction” beats speed when money or data is on the line.

We also cover safe AI adoption—using an AI readiness assessment to find blind spots, enforcing clear policies, and pressing vendors on encryption, data isolation, and model‑training practices to prevent accidental data leaks.

If you want concrete, real‑world steps—not fear—this conversation gives you a plan: broaden phishing awareness beyond email, harden default settings, train quarterly with fresh examples, and enforce dual control for sensitive actions. AI is a force multiplier on both sides. Use it to your advantage—without handing attackers the keys.

If this helped, follow the show, share it with your team, and leave a quick review so more people can find it.

...more
View all episodesView all episodes
Download on the App Store

Tech Insights with Alisha ChristianBy Mercury IT