Spread the loveDeepfake is a term that’s been rising to infamy over the past year or so, but it’s not a new concept. Deepfakes (a combination of “deep learning” and “fake”) are fake videos or audio recordings that look and sound just like the real thing.¹ It’s been used in movies for decades- usually with expensive software and million dollar
Spread the love
Deepfake is a term that’s been rising to infamy over the past year or so, but it’s not a new concept. Deepfakes (a combination of “deep learning” and “fake”) are fake videos or audio recordings that look and sound just like the real thing.¹ It’s been used in movies for decades- usually with expensive software and million dollar budgets. When actors die mid-filming or a current film is set in the past, deepfakes are useful in creating a believable scene. For example, in Star Wars: Rogue One, they brought back the character Grand Moff Tarkin from the original Star Wars. It’s not uncommon for actors to have a cameo in sequels, except Tarkin’s actor, Peter Cushing died in 1994. With some movie magic, and a stand-in actor, they were able to digitally recreate Grand Moff Tarkin for the 2016 film. This may be a cool concept for movie-goers and cinema nerds, but what happens if someone uses those same technologies to recreate you?
Jennifer Lawrence (right) at the Golden Globes with a deepfake of Steve Buschemi (left)
“Deepfake video is created by using two competing AI systems — one is called the generator and the other is called the discriminator. Basically, the generator creates a fake video clip and then asks the discriminator to determine whether the clip is real or fake. Each time the discriminator accurately identifies a video clip as being fake, it gives the generator a clue about what not to do when creating the next clip.”⁶
These videos also use generative adversarial networks (GANs) to create believable alternate videos.² As this technique becomes more popular, it gets easier and cheaper to create, and if it gets into the wrong hands, the results could be devastating. Actresses who have enemies have their face pasted onto adult film stars, or filmed saying things they never said, in attempt to ruin their career. Recently, Reddit user deepfakes pasted the faces of celebrities like Scarlett Johansson, Taylor Swift, and Maisie Williams onto X-rated GIFS. The danger if these tools become widespread is self-evident.³ A machine designed to create realistic fakes is a perfect weapon for purveyors of fake news who want to influence everything from stock prices to elections.⁴
So back to you- what happens if an ex or an angry coworker gets their hands on this software and blackmails you? How do you prove it’s not real? It looks like you and sounds like you, so it must be you. Humans rely heavily on video and audio as proof.
Currently, you may get lucky because the low budget deepfakes have many flaws and can be diffused with a little patience and a keen eye. One way researchers like Siwei Lyu,have tried to debunk fake videos is to monitor the eyes in the video for blinking.⁵ Deepfakes use deep learning to read hundreds and thousands of images, and how many pictures do you or anyone have with your eyes closed? It’s been proven that deepfakes don’t create a believable blink or don’t blink at all, because there are minimal closed-eyed photos to replicate, which is a dead giveaway.
Jennifer Lawrence’s speech as Steve Buschemi
In the near future it may not be enough to debunk via blinking. It seems as though with each technological advancement in detecting fake videos, the advancement of creating more undetectable videos increases. Future investigations regarding them may require law enforcement or the FBI if the case is serious enough. I wouldn’t go total dystopia mode though, thinking that nothing is real and everyone’s out to get you. There’s always a workaround or solution, especially in technology.
Deepfakes can be one way for a hacker to get in, check out these other five, and make sure your company doesn’t fall for these traps.
¹https://www.csoonline.com/article/3293002/deepfake-videos-how-and-why-they-work.html
²https://www.technologyreview.com/s/610253/the-ganfather-the-man-whos-given-machines-the-gift-of-imagination/
³https://www.theverge.com/2017/12/12/16766596/ai-fake-porn-celebrities-machine-learning
⁴ https://www.technologyreview.com/s/610253/the-ganfather-the-man-whos-given-machines-the-gift-of-imagination/
⁵https://www.sciencealert.com/researchers-explain-a-really-simple-way-to-tell-if-a-video-is-a-deepfake
⁶https://whatis.techtarget.com/definition/deepfake
Information Technology Aligned With Your Business Goals? Baroan is a complete IT services & IT support company working with organizations in Elmwood Park and across the United States of America.
When it comes to IT services and solutions, you need someone who not only comprehends the IT industry but is also passionate about helping clients achieve long-term growth using proven IT solutions. Guy, in leading our company, is committed to helping clients improve their technology in order to develop a competitive edge in their industries.
At Baroan Technologies, Guy Baroan leads a team of dedicated professionals who are committed to delivering exceptional IT services and solutions. With his extensive expertise and hands-on experience, Guy ensures that clients receive the utmost support and guidance in their IT endeavors. Trust in Baroan Technologies to elevate your business systems and stay ahead in today’s competitive landscape.
How Can We Help?
"*" indicates required fields
Business Physiology
The operational needs of your network infrastructure are crucial for your business’s overall health. Baroan Technologies provides Remote Monitoring and Management (RMM) to ensure the proper function of your hardware, software, and network. Our Smart Monitors dynamically adjust to your infrastructure needs, and our software suite includes tools for network management, wireless site survey, and IT documentation. We invest in professional services to optimize our use of each tool and offer a ticketing system with custom workflows for efficient communication. Let us help you avoid costly downtime and wasted resources by scheduling a review of our Statement of Work.
Business Safety Needs
Baroan provides comprehensive business safety needs for organizations looking to protect their valuable assets. Our NIST-based tiered strategy, including tools, services, and best practices, ensures compliance with cybersecurity insurance requirements. Our sophisticated approach to security employs a five-stage NIST Framework, which includes identifying, protecting, detecting, responding, and recovering from cyber threats. We also offer a wide range of tools, such as endpoint protection, zero-trust protection, secure DNS filtering, phishing filtering, and dark web scanning, as well as ongoing education for your staff. Baroan is dedicated to implementing and supporting network designs that emphasize security, compliance, and privacy protection, ensuring the safety of your critical infrastructure.
Connected Employees
Our collaboration platform allows clients and internal staff to access the same information, such as asset life cycles, roadmaps, and budgets, using dashboards and detailed reports. It builds long-term relationships and helps prioritize tasks with scoring gauges. We offer a tour of the platform to showcase its features and benefits.
Employee Satisfaction
We help businesses improve employee satisfaction and reduce turnover by creating an organized work environment with improved workflows and processes. Our approach involves gathering employee feedback through the 10-Point exercise and involving them in the analysis to determine their future day-to-day tasks. This leads to improved employee esteem and recognition.
Business Actualization
Digital transformation refers to a business becoming the best version of itself, achieving its mission through the use of technology. Take a look at the analogous pyramids below and click through to learn more about…
Leaving Already?
Before you go, please download our FREE Buyers Guide for Managed Services to know how to keep your business healthy with maximize productivity.
Download Your Free Copy Of Baroan’s Sought After Buyers Guide for Managed Services.
"*" indicates required fields
Baroan’s Business Hierarchy of Needs
Business Self-Actualization Through Digital Transformation
Esteem, respect, and recognition needs
Connection needs through collaboration
Need for data safety
Operational needs of your network infrastructure
A business owner’s goals are achieved.
Discover and create the best version of what your business can be. Our certified advisors guide you through our platform and systems to help you discover new opportunities to leverage technology for your business’s ultimate Digital Transformation (Dx). We use a well-defined, comprehensive platform, so you’re not left in a black hole of vagueness and endless consulting hours. Our weekly peer group collaboration with other consultants keeps us current with ideas. The list below shows how we utilize the platform to help you.
It starts with a Business Improvement Review (BIR), where we work with the executive team to help you score your current state and opportunities for business improvement. In the BIR, you create Business Capability Quick Scores, Digital Maturity Quick Scores, and a score for your Technology Capabilities. The BIR is free and takes less than an hour to complete. You receive a report outlining the scores and conversations from the session. If an area warrants immediate attention, you can move directly to a Dx Discovery Workshop and scope out what is needed.
The next step in our system is the Digital Maturity Assessment (DMA). This is more in-depth but with a fixed fee. You have detailed conversations about the seven areas of your business: Marketing, Operations, Finance, Management, Services, Sales, and HR. Working through the platform, you will see the initiatives you want to prioritize. Scores and reports are made available to help you decide. Again, you can act on any one item and move directly to a Discovery Workshop to scope out the work. Or you can begin building a more comprehensive portfolio to help you plan.
The Discovery Workshop is the foundation for successfully completing projects for our clients by eliminating reactive, ad-hoc experiences. We follow a specific process with specific deliverables for a Project Vision Statement, Timeline Plan, and Execution Plan. Our process helps uncover all the stakeholder needs and the vision of what the project is supposed to accomplish. And most importantly, a return on investment for the project. Workshops typically have a fee associated with them, depending on the size and complexity of the project.
The next step is to perform Dx Strategic Planning, which produces a clear vision and plan with accountability to execute the required business technology initiatives. After the BIR and DMA have addressed all the “low hanging fruit,” which were initiatives that needed immediate attention and were successfully delivered by the Discovery Workshops, it’s time to think about the long-term for the sustainability of your business and your competitive standing in your market. The Dx Strategic Planning Deliverables are the Dx Vision Statement, Dx Strategy Map, Dx Roadmap, and the Dx Execution Plan. The pricing on the planning depends on the opportunity size. However, it’s defined ahead of time, so there is no need to worry about the consulting “black hole” catching you at this point in the transformation of your business. If you’re thinking, “I don’t really need this planning,” consider that you could never properly build a house without a blueprint/plan. Does your business plan account for your digital maturity? Remember, everything in business touches technology, so you should have a strategic plan in place.
Lastly, we offer ongoing Dx Leadership to keep your team on track, helping you revise plans, set goals, review milestones, and keep a check on accountability. Not everyone has a VP of Dx. But if your company does, what better MSP to work with than Baroan Technologies? We understand Dx and are ready to work with you and help you succeed. We can fill that spot on your organization chart if you don’t have the resources. Either way, you are leveraging an organized system to attain your goal of Self-Actualization through Digital Transformation. Dx Leadership has a monthly fee for keeping your team on track to successfully execute your digital strategy.
Begin your journey today with a complimentary Business Improvement Review.
Nothing motivates employees like accomplishment. We help remove the barriers to getting things done.
Creating an organized work environment free of hassle and bottlenecks allows your employees to enjoy meaningful work. That satisfaction is passed onto clients and vendors. This helps build a strong bond between management and staff as they collaborate to create improved workflows and business processes together. What better way for employees to feel respected and important than for you to announce that you want to understand what they go through every day and improve their lives? Your employees are typically on the front line doing the client-facing work. Reduce employee and client turnover by implementing our Digital Transformation systems such as the 10-Point exercise to discover ideas from your employees on how they think the work can be improved. Empower them with a voice while you conduct a Discovery Process that:
Identifies problems and the process for resolution.
Works to gain team buy-in during group meetings.
Conducts interviews for a deeper dive into issues and uncovers potential solutions.
Has them be part of the Analysis to determine what their future looks like for their day-to-day tasks. (Who knows the work better than they do?)
Get final alignment with the team about the vision for improvement, timeline, and execution plan.
You don’t have to do team-building exercises involving closing your eyes and trusting that someone will catch you from falling. You accomplish what everyone wants, esteem, respect, and recognition.
Our collaboration platform gets everyone on the same page – our clients’ internal staff and the client with Baroan.
You can access the same information as your Baroan account manager. Find out about asset life cycles, roadmaps, and budgets. Easily view information and be on the same page utilizing dashboards and detailed reports to facilitate planning. Having access to information on more than a need-to-know basis builds long-term relationships. Many of our clients have been with us for more than ten years and up to 20+ years because we communicate and share information freely. We keep evolving by improving our reports to review all account information. However, our new platform takes it to the next level with scoring gauges for quick views of where to set priorities. The information is organized in logical groupings with attached quotes for each grouping which builds the budget and timeline. Behind the scenes, there are multiple tools for discovering warranties and subscription status information, which provide a complete picture of your assets and where you can improve.
Call today and ask for a tour of our platform so you can see sample reports and how the platform is structured to give you the best connection to what you have and where you should be with your hardware, software, and network infrastructure.
Baroan’s cybersecurity services protect your data, your money, your people, and your business.
In Maslow’s personal hierarchy, safety is second only to air, water, and food. You need to protect your business, satisfy industry compliance, and cybersecurity insurance requirements. Many sophisticated businesses employ the best of the best hackers who are endlessly trying to find ways into your business. We will help prevent breaches with our NIST-based tiered strategy that includes tools, services, best practices, and ongoing education. Cooperation with the client’s staff is important because your staff represents a gateway to your network and critical data. At Baroan, security is emphasized for our implementations, support, and network designs. The five-stage NIST Framework includes – Identify – the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. Protect – develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. Detect – develop and implement the appropriate activities to identify the occurrence of a cyber security event. Respond – develop and implement the appropriate actions for a detected cybersecurity event. Recover – The recover function aims to get back any data that might have been lost as a result of a breach or attack. It also deals with restoring services to critical systems that may have been damaged because of the incursion.
The following is a high-level list of tools employed for your safety.
Advanced Endpoint Protection
Zero-Trust Protection
Secure DNS Filtering
Vulnerability Scanning
Firewall Security
Phishing Filtering
Dark Web Scanning
Monthly Simulated Phishing Campaigns
User Awareness Training
Daily Cyber Incident News Feed
NIST Risk Assessments
Managing Microsoft 365 Licensing
Microsoft 365 Security (Depending on Licensing)
Email Spam Filtering
Advanced Security Network Monitoring
Compliance and Privacy Protection Assistance
Two Factor Authentication
Active Directory Review and Remediation to confirm all users and what they have access to
Backup and Disaster Recovery with scheduled testing for confirmation
Are you safe? Call us today to schedule a risk assessment.
How your hardware, software, and network function is the “physiology” of your infrastructure health.
Similar to air, water, and food for your body, you need to get this right to survive. Nothing else will function properly without the proper Remote Monitoring and Management (RMM) of your IT infrastructure. Baroan Technologies has invested seven years of research and development. This focused work evolved into a software company that has hundreds of other managed service providers (MSPs) utilizing the software solution that was created within Baroan Technologies. Working with these MSPs (and IT departments), we found a common theme. A tool is purchased, the standard templates provided are installed, the software is “turned on,” and the service provider or IT department is flooded with alerts. Eventually, the IT team turns the alerts off because they can never address the flood, and they miss critical alerts. They end up using the software for remote access and some basic features. However, they are not monitoring and maintaining as they should. We have addressed every nuance and detail related to RMM, starting with our Smart Monitors. Instead of applying static templates that quickly become obsolete, our Smart Monitors detect what you have and dynamically make the adjustments. Any MSP that purchases an RMM tool needs to create hundreds of scripted procedures. Most MSPs don’t have the time or necessary talent to do so, and the development never happens. Our program www.mspbuilder.com includes hundreds of dynamic scripts and procedures that evolve with each update. Each software tool we add to the suite of tools we use to maintain your network requires training, time, talent, and money to do it right. After we vet out a support tool, we select one of our Level Three engineers to become the expert in that software. They do the training, gain experience, and then they pass that knowledge onto the rest of the team. We also invest in professional services from the software vendor of the tool to review our installation and our use of the tool to make sure we are doing everything correctly and maximizing capabilities. Some examples of the suite of tools we use:
The following is a high-level list of tools employed for your safety.
Base RMM tool enhanced with custom automation scripts/procedures. (Servers, desktop, laptops) Ask to review our Statement of Work listing our services. (There are too many to mention in this space.)
Separate Apple device management RMM.
Network management and monitoring and mapping. We can detect network issues quickly, down to the device level, and provide apped diagrams.
Drive mapping for OneDrive for Business, SharePoint Online, and Microsoft Teams storage.
Wireless site survey and planning software that also helps us troubleshoot where wireless issues are occurring and how to provide better coverage.
IT Documentation Platform for devices that feed information into our account management software. This helps our engineers quickly troubleshoot.
Software that captures system configuration documentation across cloud services, network devices, and on-premises systems, applications, and services.
Professional services automation ticketing system with custom workflows for individual clients supported with bots for automation.
Ticketing system schedule automation to make it easy for clients to schedule an appointment with an engineer to reduce phone tag.
Interactive mapping to show client locations for quick and efficient dispatching.
Synchronization and reporting with ticketing system and third-party applications.
Incident management platform for after-hours notification working in tandem with a call center service to ensure a timely after-hours response.
IT and assessment reporting.
Automatic network scanning for vulnerabilities, anomalies, and malicious activity.
Email relay services.
Website availability monitoring
Baroan Technologies adopted RMM very early in the history of MSPs and has invested heavily to make sure you have your air, water, and food to function properly. Remember that payroll is the biggest line item on the Profit & Loss statement for most businesses. Having your people wasting time looking at a “spinning wheel” preventing them from working or being on helpdesk calls about performance is a huge cost that adds up minute by minute. The dollars add up very quickly.
Call to schedule a review of our Statement of Work which is a specific legal document that lists everything we deliver for your business in the RMM category.