{"id":68491,"date":"2025-07-17T11:48:00","date_gmt":"2025-07-17T10:48:00","guid":{"rendered":"https:\/\/www.n-able.com\/?p=68491"},"modified":"2025-09-09T17:56:36","modified_gmt":"2025-09-09T16:56:36","slug":"podcast-now-thats-it-deepfakes-disguises-deliveries","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries","title":{"rendered":"PODCAST | Now That&rsquo;s It: Deepfakes, Disguises, &amp; Deliveries"},"content":{"rendered":"<p><span>Modern cyberattacks aren\u2019t just technical\u2014they\u2019re personal. And Rob Shapland knows how to exploit the human element better than anyone. <\/span><\/p>\n<p><span>In this episode, Chris Massey sits down with Rob to unpack the wild world of social engineering\u2014from sneaking into corporate offices disguised as a delivery driver to using AI voice clones to bypass MFA. With over 200 successful break-ins (all authorized, of course), Rob shares what IT leaders and MSPs are still getting wrong\u2014and how to fix it.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><span>They cover: <\/span><\/h3>\n<ul>\n<li><span>Why the human layer is still the biggest vulnerability in security <\/span><\/li>\n<li><span>How attackers are already using AI for voice and video deepfakes <\/span><\/li>\n<li><span>What companies can do today to strengthen their weakest links If your clients think MFA alone is enough, this episode proves otherwise. <\/span><\/li>\n<\/ul>\n<p><span>&lsquo;Now that&rsquo;s it: Stories of MSP Success,&rsquo; dives into the journeys of some of the trailblazers in our industry to find out how they used their passion for technology to help turn Managed Services into the thriving sector it is today. Every episode is packed with the valuable insights, practical strategies, and inspiring anecdotes that lead our guests to the transformative moment when they knew\u2026.. Now, that&rsquo;s it. <\/span><\/p>\n<p><span>This podcast provides educational information about issues that may be relevant to information technology service providers. Nothing in the podcast should be construed as any recommendation or endorsement by N&#8209;able, or as legal or any other advice. <\/span><\/p>\n<p><span>The views expressed by guests are their own and their appearance on the podcast does not imply an endorsement of them or any entity they represent. Views and opinions expressed by N&#8209;able employees are those of the employees and do not necessarily reflect the view of N&#8209;able or its officers and directors. <\/span><\/p>\n<p><span>The podcast may also contain forward-looking statements regarding future product plans, functionality, or development efforts that should not be interpreted as a commitment from N&#8209;able related to any deliverables or timeframe. All content is based on information available at the time of recording, and N&#8209;able has no obligation to update any forward-looking statements.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Modern cyberattacks aren\u2019t just technical\u2014they\u2019re personal. In this episode, Rob Shapland explains how he uses social engineering to shape cybersecurity<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-68491","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>PODCAST | Now That&#039;s It: Deepfakes, Disguises, &amp; Deliveries - N-able<\/title>\n<meta name=\"description\" content=\"Modern cyberattacks aren\u2019t just technical\u2014they\u2019re personal. Rob Shapland explains how he uses social engineering to shape cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PODCAST | Now That&#039;s It: Deepfakes, Disguises, &amp; Deliveries - N-able\" \/>\n<meta property=\"og:description\" content=\"Modern cyberattacks aren\u2019t just technical\u2014they\u2019re personal. Rob Shapland explains how he uses social engineering to shape cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-17T10:48:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-09T16:56:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/07\/maxresdefault.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"PODCAST | Now That&rsquo;s It: Deepfakes, Disguises, &amp; Deliveries\",\"datePublished\":\"2025-07-17T11:48:00+01:00\",\"dateModified\":\"2025-09-09T16:56:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries\"},\"wordCount\":350,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries\",\"name\":\"PODCAST | Now That's It: Deepfakes, Disguises, &amp; Deliveries - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2025-07-17T11:48:00+01:00\",\"dateModified\":\"2025-09-09T16:56:36+00:00\",\"description\":\"Modern cyberattacks aren\u2019t just technical\u2014they\u2019re personal. Rob Shapland explains how he uses social engineering to shape cybersecurity.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PODCAST | Now That's It: Deepfakes, Disguises, &amp; Deliveries - N-able","description":"Modern cyberattacks aren\u2019t just technical\u2014they\u2019re personal. Rob Shapland explains how he uses social engineering to shape cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries","og_locale":"fr_FR","og_type":"article","og_title":"PODCAST | Now That's It: Deepfakes, Disguises, &amp; Deliveries - N-able","og_description":"Modern cyberattacks aren\u2019t just technical\u2014they\u2019re personal. Rob Shapland explains how he uses social engineering to shape cybersecurity.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-07-17T10:48:00+00:00","article_modified_time":"2025-09-09T16:56:36+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/07\/maxresdefault.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"PODCAST | Now That&rsquo;s It: Deepfakes, Disguises, &amp; Deliveries","datePublished":"2025-07-17T11:48:00+01:00","dateModified":"2025-09-09T16:56:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries"},"wordCount":350,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries","url":"https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries","name":"PODCAST | Now That's It: Deepfakes, Disguises, &amp; Deliveries - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2025-07-17T11:48:00+01:00","dateModified":"2025-09-09T16:56:36+00:00","description":"Modern cyberattacks aren\u2019t just technical\u2014they\u2019re personal. Rob Shapland explains how he uses social engineering to shape cybersecurity.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/podcast-now-thats-it-deepfakes-disguises-deliveries"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/68491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=68491"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/68491\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=68491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}