{"id":74935,"date":"2025-10-24T13:00:49","date_gmt":"2025-10-24T12:00:49","guid":{"rendered":"https:\/\/www.cxtoday.com\/?p=74935"},"modified":"2025-10-22T10:48:48","modified_gmt":"2025-10-22T09:48:48","slug":"inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud","status":"publish","type":"post","link":"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/","title":{"rendered":"Inbound Voice Is the New CX Threat Vector: Why Contact Centers Can\u2019t Afford to Ignore Voice AI Fraud"},"content":{"rendered":"<p>For years, contact centers have been tightening security around digital channels such as web, app, chat, and email, while the voice channel kept chugging along, largely untouched. But that oversight is now becoming a liability.<\/p>\n<p>AI-generated voice attacks, imposter calls, and IVR mining have created a new kind of inbound threat that\u2019s invisible to traditional fraud systems and surprisingly effective against undertrained agents.<\/p>\n<p>The inbound voice channel, still a mainstay for financial services, healthcare, and government, has lagged behind digital channels in security evolution, <strong>Mike Schinnerer<\/strong>, <strong>Vice President of Product Management at Transaction Network Services (TNS)<\/strong>, told CX Today in an interview.<\/p>\n<p>Online, there is pressure to move away from passwords to multi-factor authentication, but inbound contact center engagements often still rely on knowledge-based authentication\u2014the \u201cWhat\u2019s your mother\u2019s maiden name?\u201d routine\u2014to verify callers.<\/p>\n<p>\u201cThat\u2019s pretty vulnerable,\u201d Schinnerer said.<\/p>\n<blockquote><p>\u201cIt often ends up being an imposter talking to an agent. And those agents are sometimes easily fooled and manipulated\u2026 because they\u2019re people too and they\u2019re vulnerable to being misguided.\u201d<\/p><\/blockquote>\n<p>The result is a perfect storm of human vulnerability and AI-enabled deception.<\/p>\n<p>As AI voice synthesis becomes easier to deploy, bad actors are exploiting it to create lifelike caller voices that can pass basic screening. Some use interactive voice response (IVR) mining \u2014 repeatedly calling 1-800 numbers to study how an organization\u2019s IPR system behaves, before launching a real attack.<\/p>\n<p>\u201cThe intent of this initial call into the care support line is not necessarily to\u2026 steal money,\u201d Schinnerer explained. \u201cThey&#8217;re just trying to do reconnaissance to understand where the vulnerabilities are.\u201d<\/p>\n<p>That\u2019s the double-edged sword of AI in the contact center: it\u2019s both the threat and the solution as enterprises deploy it for call routing to enhance customer experience. \u201cThat\u2019s great, but let\u2019s make sure that we\u2019re not embracing a technology that has vulnerabilities,\u201d Schinnerer said.<\/p>\n<p>\u201cIt&#8217;s a new technology for the contact centers, so there is continual learning back and forth on how we can understand how they implement their AI agents, and then we can work with them to identify vulnerabilities. It&#8217;s almost like penetration testing and software code to help identify those moments,\u201d Schinnerer said.<\/p>\n<p>\u201cThe AI agent is new, it&#8217;s a good buzzword, but we&#8217;re still learning. Every cloud contact center, if you go into their marketplace, there&#8217;s [at least] five different service providers touting an AI voice or AI agent experience.<\/p>\n<p>\u201cWe&#8217;re trying to evaluate the credibility of those and the vulnerabilities of those types of service providers, either in partnership with them or not.<\/p>\n<p>\u201cIt&#8217;s new. It&#8217;s not going to be solved in the next three months. It&#8217;s going to take more than that to identify where those vulnerabilities are, and then to help the education of the enterprises using them on how to strengthen [their defenses] if there is an exposure or not.\u201d<\/p>\n<p>Fraudsters are now extending their reach into smaller companies, requiring them to be more alert.<\/p>\n<p>For instance, in financial services, \u201cten years ago, a lot of the imposter fraud was attacking larger financial institutions,\u201d Schinnerer said. \u201cBut we&#8217;re now seeing it trend into the regional banks. And those regional banks often have more vulnerabilities or exposure to risk, and\u2026 when these fraud events happen, they\u2019re more impactful for them.\u201d<\/p>\n<blockquote><p>For one, it creates an unsavory taste in the consumer&#8217;s mouth, and they might leave and go to a bigger brand that they feel is protecting them better, or they already have financial payouts and penalties.<\/p><\/blockquote>\n<p>From working with health care organizations on outbound calling, it is clear that businesses have to be tech savvy to navigate these increasingly sophisticated attacks, Schinnerer said.<\/p>\n<p>\u201cWhat we&#8217;re seeing when we engage the healthcare organizations is that they don&#8217;t necessarily have a sophisticated customer care service and platform that they&#8217;re using. So there&#8217;s a little bit of immaturity in the healthcare market on what calling platforms that they use, and a lot of them are calling from local numbers within their regions, but\u2026 it is a target.\u201d<\/p>\n<p>Brands also need to be aware of how imposters are carrying out multimodal attacks, using both voice and messaging to find vulnerabilities or use them in tandem, to see which one they can get through.<\/p>\n<p>\u201cWe&#8217;re working with other partners who have more of a messaging background and messaging security, and seeing how we can complement one another with the data that they have and the data that we have, so that we can bring a multimodal solution to the market,\u201d Schinnerer said.<\/p>\n<h2>From \u2018Trust But Verify\u2019 to \u2018Never Trust, Always Verify\u2019<\/h2>\n<p>To counter these threats, companies like TNS are pushing for a zero-trust approach to voice \u2014 treating every inbound and outbound call as potentially hostile until verified.<\/p>\n<p>\u201cA zero trust voice framework is gaining momentum. So we started shifting the conversations as we engage enterprises.<\/p>\n<p>\u201cWhere before we were getting engaged with their support organization or their marketing organization for customer outreach, we started elevating these conversations to the CISO organizations, and those are the ones that understand and comprehend this \u2018never trust, always verify\u2019 approach, because that&#8217;s what they&#8217;ve implemented for their data security or their online security principles.\u201d<\/p>\n<p>\u201cWhen we approach them and say we&#8217;re not going to trust any call into or out of your voice platform, because that&#8217;s the only way we can ensure that we remove fraud, they say, \u2018Yeah, that makes perfect sense.\u2019\u201d<\/p>\n<blockquote><p>Ultimately, what we see is that there&#8217;s an ROI to it, there&#8217;s an arc. There&#8217;s an ROI from the customer satisfaction perspective, and then there&#8217;s an ROI because we can remove a lot of the fraud that originates from this exposure that they have, which is their voice network.<\/p><\/blockquote>\n<p>This zero-trust framework uses AI and network-level data to validate that calls come from the devices and networks they claim to \u2014 effectively creating multi-factor authentication for voice.<\/p>\n<p>TNS monitors billions of calls daily for carriers and enterprises, which allows it to develop multi-factor authentication that is less reliant humans to authenticate callers.<\/p>\n<p>\u201cWe can check [the carrier network] if the phone call is originating from the actual device,\u201d Schinnerer explained. \u201cIf they\u2019re on Verizon, we go ping Verizon \u2014 is this call active? We can do more deterministic type of interrogations. We can also do some AI voice detection, to see if this is not the actual caller\u2019s voice.\u201d<\/p>\n<h2>Filtering Fraud at the Edge<\/h2>\n<p>One of the biggest shifts in inbound voice protection is moving detection to the \u201cedge\u201d, using network attributes to identify suspicious callers.<\/p>\n<p>\u201cThe goal is\u2026 to filter the bad actors and the imposters before they get to the agents,\u201d Schinnerer said.<\/p>\n<p>That way, customer service agents aren\u2019t vulnerable or under pressure to resolve fraudulent calls, especially as high churn rates of contact center employees make it challenging for managers to keep their teams trained and vigilant.<\/p>\n<p>This filtering relies on network intelligence\u2014for example, seeing if one number has been calling multiple banks or trying to penetrate several financial institutions in a short time frame.<\/p>\n<p>Crucially, these checks happen in real time. <span data-olk-copy-source=\"MessageBody\">TNS&#8217; Enterprise Voice Security<\/span> suite also runs AI synthetic voice detection while a conversation is happening.<\/p>\n<p>\u201cWe can do the detection within about 15 seconds and\u2026 we can alert the care agent that we think something&#8217;s going on here,\u201d Schinnerer explained.<\/p>\n<p>\u201cAnd within those 15-30 seconds, by that time, you haven&#8217;t really disclosed anything. You&#8217;re still trying to figure out why they&#8217;re calling, what the intention is, and you haven&#8217;t disclosed any PII information.\u201d<\/p>\n<p>This allows the enterprise to identify fake calls without disrupting the experience for legitimate customers.<\/p>\n<p>\u201cThe thing we need to be mindful of is that we don&#8217;t ruin the experience for good actors,\u201d Schinnerer said. \u201cSo we don&#8217;t want to make it too long on the phone to do the analysis and the determination before we send the good calls to the agents.\u201d<\/p>\n<h2>Security as a Customer Service Differentiator<\/h2>\n<p>While adding new security layers can sound like friction, in many cases, it actually improves brand trust. \u201cUltimately, even if there\u2019s a little delay getting [callers] to an agent, what we&#8217;re also seeing with institutions that we talk to, especially these downmarket ones, because they&#8217;re competing against the big brands\u2026 we help them position it to their consumers as a differentiator.\u201d<\/p>\n<p>Brands can highlight their strong security focus on protecting customers in their marketing campaigns, emphasizing how their fraud prevention measures set them apart, Schinnerer suggested. This messaging appears to resonate with customers, who express appreciation and trust towards companies prioritizing their safety.<\/p>\n<p>This mindset also applies to buyer evaluations. \u201cIt&#8217;s really important to understand what impacts their business,\u201d Schinnerer said.\u201cFirst and foremost, understanding what really business outcomes you want and understanding what that spend and cost also might look like, because that is also part of that ROI assessment, and then it&#8217;s a matter of always trying to improve your implementation and your solution.\u201d<\/p>\n<blockquote><p>What are you trying to accomplish? Are you trying to improve your agent efficiency? Are you trying to reduce your exposure, or reduce your out payment of fraud loss?<\/p><\/blockquote>\n<p>Because, as Schinnerer pointed out, there is no magic, hands-off answer:<\/p>\n<p>\u201cWe&#8217;ve had inbound voice authentication for a little while now, and it&#8217;s been expensive\u2026 When you think of the fraud departments inside of those organizations, they were hopeful that it would be a silver bullet, in that if they can implement inbound voice authentication, it would remove the fraud, and it necessarily hasn&#8217;t, that&#8217;s just because, again, with the AI voice agents and other ways of bad actors always changing, it is not a set-and-forget type of solution.\u201d<\/p>\n<p>Enterprises have to stay on top of understanding the threat landscape and where new attacks are coming from. To do that, they need to \u201cchoose a partner that can see the whole picture, not just the inbound picture,\u201d Schinnerer said.<\/p>\n<p>As AI blurs the line between real and fake voices, inbound call security is no longer optional \u2014 it\u2019s strategic. Enterprises need to start treating the phone channel like any other digital access point \u2014 zero trust, AI-augmented, and continuously verified<strong>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For years, contact centers have been tightening security around digital channels such as web, app, chat, and email, while the voice channel kept chugging along, largely untouched. But that oversight is now becoming a liability. AI-generated voice attacks, imposter calls, and IVR mining have created a new kind of inbound threat that\u2019s invisible to traditional [&hellip;]<\/p>\n","protected":false},"author":11074,"featured_media":74942,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[11850],"class_list":["post-74935","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-contact-center","tag-agentic-ai","tag-ai-agent","tag-ai-agents","tag-artificial-intelligence","tag-cloud-contact-center","tag-security-and-compliance","brands_to_track-cx-today","editorial_type-interview","intent-loyalty","target_audience-industry-professional"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3.1 (Yoast SEO v25.3.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Inbound Voice Is the New CX Threat Vector: Why Contact Centers Can\u2019t Afford to Ignore Voice AI Fraud - CX Today<\/title>\n<meta name=\"description\" content=\"CX Today covers Contact Center &amp; Omnichannel\u200b news including Agentic AI, AI Agent, AI Agents, Artificial Intelligence, Cloud Contact Center, Security and Compliance and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inbound Voice Is the New CX Threat Vector: Why Contact Centers Can\u2019t Afford to Ignore Voice AI Fraud\" \/>\n<meta property=\"og:description\" content=\"CX Today covers Contact Center &amp; Omnichannel\u200b news including Agentic AI, AI Agent, AI Agents, Artificial Intelligence, Cloud Contact Center, Security and Compliance and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/\" \/>\n<meta property=\"og:site_name\" content=\"CX Today\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CXTodayNews\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-24T12:00:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251016-TNS-interview.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nicole Willing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cxtodaynews\" \/>\n<meta name=\"twitter:site\" content=\"@cxtodaynews\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nicole Willing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/\"},\"author\":{\"name\":\"Nicole Willing\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/person\/8e1bd49fc15db705ae5c169d08ebe3cc\"},\"headline\":\"Inbound Voice Is the New CX Threat Vector: Why Contact Centers Can\u2019t Afford to Ignore Voice AI Fraud\",\"datePublished\":\"2025-10-24T12:00:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/\"},\"wordCount\":1748,\"publisher\":{\"@id\":\"https:\/\/www.cxtoday.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251016-TNS-interview.jpg\",\"keywords\":[\"Agentic AI\",\"AI Agent\",\"AI Agents\",\"Artificial Intelligence\",\"Cloud Contact Center\",\"Security and Compliance\"],\"articleSection\":[\"Contact Center &amp; Omnichannel\u200b\"],\"inLanguage\":\"en-GB\",\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.cxtoday.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/\",\"url\":\"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/\",\"name\":\"Inbound Voice Is the New CX Threat Vector: Why Contact Centers Can\u2019t Afford to Ignore Voice AI Fraud - CX Today\",\"isPartOf\":{\"@id\":\"https:\/\/www.cxtoday.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251016-TNS-interview.jpg\",\"datePublished\":\"2025-10-24T12:00:49+00:00\",\"description\":\"CX Today covers Contact Center &amp; Omnichannel\u200b news including Agentic AI, AI Agent, AI Agents, Artificial Intelligence, Cloud Contact Center, Security and Compliance and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/#primaryimage\",\"url\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251016-TNS-interview.jpg\",\"contentUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251016-TNS-interview.jpg\",\"width\":850,\"height\":425},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cxtoday.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Contact Center &amp; Omnichannel\u200b\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cxtoday.com\/#website\",\"url\":\"https:\/\/www.cxtoday.com\/\",\"name\":\"CX Today\",\"description\":\"Customer Experience Technology News\",\"publisher\":{\"@id\":\"https:\/\/www.cxtoday.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cxtoday.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cxtoday.com\/#organization\",\"name\":\"CX Today\",\"url\":\"https:\/\/www.cxtoday.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png\",\"contentUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png\",\"width\":2606,\"height\":1154,\"caption\":\"CX Today\"},\"image\":{\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CXTodayNews\/\",\"https:\/\/x.com\/cxtodaynews\",\"https:\/\/www.linkedin.com\/company\/69192959\/\",\"https:\/\/www.youtube.com\/channel\/UCZSpkvnZtjGc7UAP1r-MRoA\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/person\/8e1bd49fc15db705ae5c169d08ebe3cc\",\"name\":\"Nicole Willing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5f0a6caa39ad8b38b6b329e6edd0fb162be6bd696067957e094e1757f8673c5c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5f0a6caa39ad8b38b6b329e6edd0fb162be6bd696067957e094e1757f8673c5c?s=96&d=mm&r=g\",\"caption\":\"Nicole Willing\"},\"description\":\"Nicole Willing is B2B journalist with expertise spanning the technology and financial industries. For more than 20 years, she has reported extensively on the key issues affecting business operations and supply chains, and she has developed a keen interest in how emerging technologies like AI are reshaping the way enterprises work. She has a passion for translating complex innovations into engaging stories that inform business decision-makers and inspire new ideas.\",\"url\":\"https:\/\/www.cxtoday.com\/author\/nicole-willingcxtoday-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Inbound Voice Is the New CX Threat Vector: Why Contact Centers Can\u2019t Afford to Ignore Voice AI Fraud - CX Today","description":"CX Today covers Contact Center &amp; Omnichannel\u200b news including Agentic AI, AI Agent, AI Agents, Artificial Intelligence, Cloud Contact Center, Security and Compliance and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/","og_locale":"en_GB","og_type":"article","og_title":"Inbound Voice Is the New CX Threat Vector: Why Contact Centers Can\u2019t Afford to Ignore Voice AI Fraud","og_description":"CX Today covers Contact Center &amp; Omnichannel\u200b news including Agentic AI, AI Agent, AI Agents, Artificial Intelligence, Cloud Contact Center, Security and Compliance and more.","og_url":"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/","og_site_name":"CX Today","article_publisher":"https:\/\/www.facebook.com\/CXTodayNews\/","article_published_time":"2025-10-24T12:00:49+00:00","og_image":[{"width":850,"height":425,"url":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251016-TNS-interview.jpg","type":"image\/jpeg"}],"author":"Nicole Willing","twitter_card":"summary_large_image","twitter_creator":"@cxtodaynews","twitter_site":"@cxtodaynews","twitter_misc":{"Written by":"Nicole Willing","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/#article","isPartOf":{"@id":"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/"},"author":{"name":"Nicole Willing","@id":"https:\/\/www.cxtoday.com\/#\/schema\/person\/8e1bd49fc15db705ae5c169d08ebe3cc"},"headline":"Inbound Voice Is the New CX Threat Vector: Why Contact Centers Can\u2019t Afford to Ignore Voice AI Fraud","datePublished":"2025-10-24T12:00:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/"},"wordCount":1748,"publisher":{"@id":"https:\/\/www.cxtoday.com\/#organization"},"image":{"@id":"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251016-TNS-interview.jpg","keywords":["Agentic AI","AI Agent","AI Agents","Artificial Intelligence","Cloud Contact Center","Security and Compliance"],"articleSection":["Contact Center &amp; Omnichannel\u200b"],"inLanguage":"en-GB","copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/www.cxtoday.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/","url":"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/","name":"Inbound Voice Is the New CX Threat Vector: Why Contact Centers Can\u2019t Afford to Ignore Voice AI Fraud - CX Today","isPartOf":{"@id":"https:\/\/www.cxtoday.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/#primaryimage"},"image":{"@id":"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251016-TNS-interview.jpg","datePublished":"2025-10-24T12:00:49+00:00","description":"CX Today covers Contact Center &amp; Omnichannel\u200b news including Agentic AI, AI Agent, AI Agents, Artificial Intelligence, Cloud Contact Center, Security and Compliance and more.","breadcrumb":{"@id":"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/#primaryimage","url":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251016-TNS-interview.jpg","contentUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251016-TNS-interview.jpg","width":850,"height":425},{"@type":"BreadcrumbList","@id":"https:\/\/www.cxtoday.com\/contact-center\/inbound-voice-is-the-new-cx-threat-vector-why-contact-centers-cant-afford-to-ignore-voice-ai-fraud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cxtoday.com\/"},{"@type":"ListItem","position":2,"name":"Contact Center &amp; Omnichannel\u200b"}]},{"@type":"WebSite","@id":"https:\/\/www.cxtoday.com\/#website","url":"https:\/\/www.cxtoday.com\/","name":"CX Today","description":"Customer Experience Technology News","publisher":{"@id":"https:\/\/www.cxtoday.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cxtoday.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.cxtoday.com\/#organization","name":"CX Today","url":"https:\/\/www.cxtoday.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png","contentUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png","width":2606,"height":1154,"caption":"CX Today"},"image":{"@id":"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CXTodayNews\/","https:\/\/x.com\/cxtodaynews","https:\/\/www.linkedin.com\/company\/69192959\/","https:\/\/www.youtube.com\/channel\/UCZSpkvnZtjGc7UAP1r-MRoA"]},{"@type":"Person","@id":"https:\/\/www.cxtoday.com\/#\/schema\/person\/8e1bd49fc15db705ae5c169d08ebe3cc","name":"Nicole Willing","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cxtoday.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5f0a6caa39ad8b38b6b329e6edd0fb162be6bd696067957e094e1757f8673c5c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5f0a6caa39ad8b38b6b329e6edd0fb162be6bd696067957e094e1757f8673c5c?s=96&d=mm&r=g","caption":"Nicole Willing"},"description":"Nicole Willing is B2B journalist with expertise spanning the technology and financial industries. For more than 20 years, she has reported extensively on the key issues affecting business operations and supply chains, and she has developed a keen interest in how emerging technologies like AI are reshaping the way enterprises work. She has a passion for translating complex innovations into engaging stories that inform business decision-makers and inspire new ideas.","url":"https:\/\/www.cxtoday.com\/author\/nicole-willingcxtoday-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts\/74935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/users\/11074"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/comments?post=74935"}],"version-history":[{"count":4,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts\/74935\/revisions"}],"predecessor-version":[{"id":75386,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts\/74935\/revisions\/75386"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/media\/74942"}],"wp:attachment":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/media?parent=74935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/categories?post=74935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}