CIO Influence
Data Management Guest Authors IT and DevOps Machine Learning Security

Humans are the New Firewall

Humans are the New Firewall

Cybersecurity teams spend most of their time defending against malware, software vulnerabilities and unpatched systems, but the most dangerous cybersecurity vulnerability in 2026 is the human element and trust verification, not an underlying system. AI has made a generational leap in its ability to impersonate convincingly. Phishing via email, voice and video is almost indistinguishable from the real thing – few organizations are truly prepared.

Currently there is no automated one-stop solution to stem the tide. Everyone at the company needs to be aware, vigilant and prepared. The level of realism is unprecedented. To understand what effective defense looks like, it helps to understand how the threat itself changed.

What AI Changed

There are two major ways that AI has reshaped the threat landscape. The first is smarter bot traffic and bot attacks. Bad actors now can use AI to make bot attacks much stronger, by making bot attacks mimic real traffic patterns. This makes traditional fingerprinting and CAPTCHA defenses harder. Automated login attempts have jumped 45% since January 2025, due mostly to largely AI-enhanced botnet activity. To address this, IT teams can use defensive AI to fight back. This is an arms race of tit for tat. There are established mitigation paths, such as rate limiting, CAPTCHA challenges, IP reputation filtering and CDN-level DDoS protection. But ultimately bot traffic is a stability issue, not the biggest security concern.

Hyperrealistic Impersonation

The real threat is impersonation that is so realistic it is hard to identify. AI can now impersonate a person in writing, voice or live video in an extremely realistic way, and itโ€™s already being weaponized โ€” for example, a personโ€™s writing style can be cloned with free tools. Once-obvious signs of phishing such as grammatical errors and awkward phrasing can be eliminated. Some 82.6% of phishing emails now use some form of AI-generated content. And AI-generated phishing emails have a 60% higher click rate than traditional ones. Meanwhile, voice cloning has become much easier, requiring as little as 20 to 30 seconds of audio to create convincing cloned audio. The cloning is so realistic that humans have a hard time differentiating real from fake. In one documented case, a finance director at a Singapore firm was tricked by a fabricated video call where every participant was a deepfake, and ended up authorizing a $499,000 transfer. In the first quarter of 2025, losses from deepfakes exceeded $200 million. These attacks have serious consequences for website owners and administrators. A convincing message from an apparent colleague, hosting provider or developer is often all it takes to hand over credentials or grant access to a WordPress dashboard. At that point, every other security measure doesnโ€™t matter. Which is why verification methodology is where defense has to start.

Also Read:ย CIO Influence Interview with Gihan Munasinghe, CTO of One Identity

The WordPress Security Layer

Before we can protect against impersonation, it is important to cover the usual suspects, as this will make phishing more difficult. Every login password must be unique and strong (I also make my usernames strong passwords), use a dedicated password manager like 1Password and enable 2-factor authentication (2FA) with an authenticator app like Google Authenticator. I wouldnโ€™t recommend SMS, because phone-number-based 2FA is susceptible to SIM-swap attacks, where an attacker can social-engineer the mobile carrier into redirecting the victimโ€™s number and intercepting the verification code.And critically: do not store 2FA codes in the same location as passwords, as that increases your risk.

To protect WordPress sites, there are particular issues to protect against. Plugins and themes are a major vulnerability, with 96% of WordPress vulnerabilities found in plugins and themes. Teams often keep plugins that are deprecated because they feel that they are essential. But a plan should always be made to remove such plugins as soon as possible. Ultimately, the best approach is to keep WordPress core, themes and all plugins updated as quickly as possible. And only use well-maintained reputable ones with active developer support.

The Human Layer

There is no single solution to protect effectively against phishing and social engineering. The best defense is cultural and behavioral. The belief that software can protect you, that you will not be targeted or that you would not be fooled is the number one mistake that gets exploited.

Attacks succeed by manufacturing urgency and artificial stress โ€” which is now aided by AI tooling to be maximally effective. A sharply worded email from an apparent CEO or important contact, an unexpected call, a video message from a familiar face. The goal: force an action before the target has a moment to think or verify. This is also why strong authentication alone will not help. If an employee is convinced to grant admin access, the attacker never needs to touch the authentication layer at all. Some 85% of organizations have had at least one deepfake-related incident in the past 12 months, and 55% reported financial losses from them.

Slow Down and Verify

The correct response to any request that involves security-sensitive actions such as access, credentials or fund transfers, is to pause and independently verify. One way to do this is to ask a question that only a real person could answer. For example, a personal or contextual detail that an attacker wouldnโ€™t know. So when your CEO sends a sharply-worded email about why you havenโ€™t given him access to the Google Admin page yet, is everyone in the organization prepared to say no, or ask why and then follow up and verify whether the request is real? It is crucial that organizations develop a culture that encourages people to question suspicious requests and leaders of the organization accept and encourage those questions โ€” to see it is an active security feature, not a hindrance.

In my 10-year tenure as CTO, I have yet to encounter a situation that does not allow for a few minutes to slow down, think and verify. Most situations are far less urgent than they feel. The additional few minutes might make things a little more tense, but if you can prevent a serious security breach once, it will have paid off a million fold.

Infrastructure Basics Matter

The human layer is the new attack surface, but donโ€™t overlook fundamental technical foundations. Without solid infrastructure, you only add to your human risk. Avoid low-cost shared hosting for any site with user data or requiring reliable uptime, because these environments typically lack the firewalls and isolation needed to block edge-level attacks. Also, DDoS protection via a global network is mandatory. The rise of AI-enhanced botnets makes mitigation without distributed infrastructure nearly impossible. Make sure to enforce 2FA for all hosting access across the organization. Prioritize hosting providers with independent security compliance certifications such as SOC 2, which ensures third parties have verified security claims. And make backups that are stored externally and independently, not only with the hosting provider. Finally, own your infrastructure, not just your content, by understanding what data exists and where it lives. This is especially important if you donโ€™t have a dedicated security team.

Security Starts With People

The security perimeter used to be more technical in nature. Phishing and social engineering have always existed, but In 2026 the explosion of AI-supported tooling has skyrocketed them to the top. Your employees are the firewall. Every login, email, audio or video call is a potential entry point. Organizations that stay resilient are the ones that practice healthy skepticism and make it a habit. To protect your organization, start with basic authentication practices, keep software current and build a culture where it is normal to pause and verify under pressure.

About Kinsta

Kinsta is a premium managed hosting for WordPress solution โ€“ designed for all types of businesses,ย agencies and high-traffic ecommerce stores.

Catch more CIO Insights:ย CIO as Orchestrator of Cross-Functional Digital Strategy

[To share your insights with us, please write toย psen@itechseries.comย ]

Related posts

Top 10 CIO Influence News of Apr’23

CIO Influence Staff Writer

Expanded Cybersecurity Partnership with CrowdStrike Further Protects the Public Against Potential Attacks

CIO Influence News Desk

StrongBox Data Solutions Expands Global Channel Program

CIO Influence News Desk