Networks
Future ready, intelligent networks for critical environments.
Designing, securing and managing the critical infrastructure powering the leading data centres across the UK and Europe.
Partnering with the UK’s leading construction contractors in delivering tech services to power future facilities.
Partnering with landlords and agents to create engaging workplaces through innovative technology services.
Empowering mid-market success and streamlining operations with co-managed IT services.
Leveraging our expertise to implement transformative technologies and services, we enable our SMB clients to focus on their growth.
We are a happy, supportive community with a clear sense of purpose and a strong team ethic.
Partnership is not a posture but a process – a continuous process that grows stronger each year as we devote ourselves to common goals.
We will dedicate more of our time and our talent to do all we can to positively impact the environment, our workforce and our community.
We are always looking for new talent. If you're looking to become a part of something great, let us know.
We create true alignment between your ambitions and the technology you need to achieve them.
Latest posts on the technology ecosystem covering cutting-edge industry trends, expert advice, valuable insights and thought leadership.
From award wins to sustainability, team events and coverage in the media - stay up to date on everything OryxAlign with our latest news.
Explore current and future trends across the technology landscape with our comprehensive selection of videos, infographics and guides.
This incident highlights the growing threat of advanced cyber-attacks and underscores the need for heightened vigilance and robust security measures. Vishing, short for voice phishing, refers to fraudulent phone or video calls and voice messages designed to trick victims into providing sensitive information, like login credentials, credit card numbers, or bank details and money transfers.
In the Arup scam, perpetrators posed as senior company officers during a seemingly genuine company video conference. They used AI-generated deepfake technology to convincingly impersonate high-ranking executives, persuading an employee to transact with designated bank accounts.
In January, Arup reported the fraud to the police, although details remain scant due to the ongoing investigation. The company assured that its financial stability and business operations were not compromised, and none of its internal systems were breached.
This incident follows a similar report by Hong Kong police in February, initially identifying the victim only as an employee at an unnamed company.
Arup's global chief information officer, Rob Greig, emphasised this is not an isolated case. "Like many other businesses around the globe, our operations are subject to regular attacks, including invoice fraud, phishing scams, WhatsApp voice spoofing, and deepfakes. We have seen that the number and sophistication of these attacks has been rising sharply in recent months," he said.
Greig hoped that Arup's experience would raise awareness about cybercriminals' increasing sophistication and evolving techniques. The Financial Times was the first to report that Arup was the company targeted by the fraudsters.
The incident with Arup is part of a worrying trend of rising cyber-attacks utilising advanced technologies. Arup, a leading consulting engineering firm with over 18,000 employees, is renowned for its work on iconic projects such as the Sydney Opera House and the Crossrail transport scheme in London.
This event echoes another recent deepfake scam involving the head of the world's largest advertising group, WPP. Mark Read, WPP's chief executive, revealed that he had been targeted by a deepfake scam using an AI voice clone. This growing trend of using AI to create compelling fake audio and video content poses significant risks to organisations worldwide.
Given the increasing prevalence and sophistication of deepfake scams, businesses and individuals must adopt proactive measures to protect themselves. Here are five key strategies to help avoid becoming a victim:
Implement Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring multiple types of verification before allowing access to sensitive information or authorising transactions. These can include something you know (password), something you have (security token), and something you are (biometric verification).
Conduct regular cyber security training: Educate employees about the latest phishing tactics, deepfake threats, and other cyber scams. Regular training sessions can help staff recognise potential threats and respond appropriately, reducing the likelihood of successful attacks.
Verify identities through multiple channels: When dealing with sensitive transactions or information, verify the requesting party's identity through multiple channels. For example, confirm a request via email or video call with a follow-up phone call or an in-person meeting.
Use advanced AI detection tools: Invest in advanced AI and machine learning tools to detect and flag deepfakes and other fraudulent activities. These tools can analyse patterns and anomalies indicating a deepfake attempt, providing additional protection.
Establish strict financial protocols: Develop and enforce strict protocols for financial transactions. This can include requiring multiple approvals for large transfers, setting transaction limits, and maintaining a transparent chain of command for authorising payments. Regular audits and reviews of financial processes can also help identify and mitigate risks.
The deepfake vishing scam that targeted Arup is a stark reminder of the growing threats posed by advanced cyber-attacks. As technology continues to evolve, so do cybercriminals' methods.
By implementing robust security measures, conducting regular training, and staying vigilant, businesses can better protect themselves against these sophisticated scams.
The experiences of companies like Arup and WPP highlight the importance of being proactive and prepared in the face of increasingly complex cyber threats.