Unemployable Graduate
Advertisement
  • Home
  • Education
  • Economics
  • Public Policy
  • Workforce
  • Videos
  • Privacy Policy
  • Contact Us
No Result
View All Result
Unemployable Graduate
  • Home
  • Education
  • Economics
  • Public Policy
  • Workforce
  • Videos
  • Privacy Policy
  • Contact Us
No Result
View All Result
Unemployable Graduate
No Result
View All Result
Home Workforce

How to Protect Your Employees and Company from AI-Related Cyber Attacks

October 8, 2023
in Workforce
0
How to Protect Your Employees and Company from AI-Related Cyber Attacks
190
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


With ChatGPT, generative AI has ushered in a new era of cybersecurity. Here are seven ways to protect your organization from generative AI cyberattacks.

October 2023 marks the 20th Cybersecurity Awareness Month, a government-industry collaboration to raise awareness about digital security and encourage people to protect data from cybercrime. While cyber criminals have always evolved their tactics, techniques, and procedures (TTPs) to exploit vulnerabilities in computer systems and networks, one factor is changing the game this year: generative artificial intelligence (AI).

With the release of ChatGPT in November 2022, generative AI has ushered in a new era for cybersecurity, transforming the actions of both attackers and defenders. Here are seven ways to protect your organization from generative AI cyberattacks.

 

How Generative AI is Changing Cyberattacks

Generative AI is a branch of AI that creates new content, in response to a human or programmed prompt, based on analyzing a massive amount of existing content. Generative AI can create new text, videos, images, and other content. Cybercriminals are using that capability to generate content and communications to maliciously target victims in defined geographies, demographics, and even organizations.

Because the AI-generated content is so like that created by humans, it’s very difficult for readers/users to discern the creator. This becomes particularly problematic when generative AI is used to create convincing scams. One article from Comcast Business explains, “Generative AI can create fraudulent content and digital interactions, including real-time conversations, to impersonate users and elevate social engineering and phishing attacks. It also enables non-native English speakers to refine messages and avoid common linguistic pitfalls.”

The article urges people to be alert to:

  • Fake digital content, including avatars, social media profiles, and malicious websites that can be used to collect credentials and user information.
  • Video deep fakes that can trick users into divulging credentials, potentially undermining the effectiveness of employee cybersecurity training.
  • Voice deep fakes that simulate the voices of managers and senior executives, leaving fraudulent voice memos or other communications with instructions for staff.
  • Fake documents that look like authentic documentation and authorizations, designed to breach defenses.

 

7 Ways to Boost Your AI Cybersecurity

It’s always been true that, for cyber resilience, each of us has a part to play.

Partners for the National Cyber Security Month, the Cybersecurity and Infrastructure Security Agency (CISA) and National Cybersecurity Alliance, urge businesses to take these four steps to be cyber resilient:

1. Teach Employees to Avoid Phishing. According to the 2023 Comcast Business Cybersecurity Threat Report, phishing is the leading cyber-attack, with nine out of 10 attempts to breach networks starting with a phish. Phishing is when a perpetrator sends an email or text designed to lure unsuspecting recipients into clicking on a link and submitting information so the attacker can gain access to a system with private data. A phishing attack can cause extensive financial harm to individuals and companies.

ACTION: Start by reviewing your existing training on cybersecurity and phishing. Add or update content to reflect today’s threats and tactics. Consider making the training mandatory for all employees, at all levels, at least annually. Complement the training with communications you regularly share with the team, so they know what to do and who to contact if they receive a suspicious message. Doing so will help turn your greatest cyber vulnerability (your workforce and contractors) into a cyber strength.

2. Require Strong Passwords. Stolen or weak passwords are still one of the main ways that malicious cyber actors gain access to applications and networks. Strong passwords can help to safeguard the data and prevent access. Long, random, unique passwords are the strongest.

ACTION: If you’re using passwords at your organization, require strong passwords and regular password updates. A reputable password manager can help individuals keep track of their unique passwords. Also, look into the use of passkeys, alternatives passwords that provide faster, easier, and more secure sign-ins to websites and apps. As the FIDO Alliance explains, “Unlike passwords, passkeys are always strong and phishing-resistant.​”

3. Require Multi-Factor Authentication. Multi-factor authentication (MFA), also known as “two-factor authentication” or “two-step authentication,” adds a layer of security by requiring a second verification when logging into an account. The second verification may be a one-time code texted to a phone, emailed to a predefined address, or generated by an authentication app. Biometrics (facial recognition or a fingerprint) or a security key may also be used as the second verification — especially in secure facilities that prohibit the use of personal phones.

ACTION: Require MFA for on-site and remote employees, contractors, and anyone else that may access your organization’s systems. This is another “hassle” that most people accept as necessary to protect personal and company data.

4. Keep Business Software Updated and Patched. Cyber criminals are experts at exploiting software vulnerabilities to access systems and acquire data. Software developers routinely create updates and patches to address security vulnerabilities — and it’s imperative that organizations apply them. ServiceNow reports that 60 percent of organizations have been victims of a cyber breach due to unpatched vulnerabilities where patches were available.

ACTION: Create an inventory of authorized hardware and software for your organization and remove any unauthorized hardware or software. For operating systems and applications, monitor, test, and deploy the latest updates; enable as many automatic updates as practical. Educate and remind employees to set up automated updates on their own devices. Have them work with your IT team for approval and support before adding new software or apps on company devices. 

We add three additional ways to combat cyber threats and attacks at your organization.

5. Upskill Your Cyber Professionals. It helps to have designated personnel who are responsible for managing the cybersecurity policies, tools, and procedures at your organization. Threats, vulnerabilities, TTPs, and cyber defense best practices are rapidly changing and it’s essential that your cyber team stays ahead of the cyber criminals.

ACTION: Ensure that your cyber professionals are learning about the latest tools and practices. Give them ample opportunity to build their skills, so they are practiced at monitoring, identifying, and responding to threats and attacks. If they aren’t yet expert in AI, pursue upskilling opportunities so they are fully armed for AI cybersecurity.   

6. Update Your Business Continuity Plan. The best business continuity plans recognize cyber attacks as one threat the business needs to prepare for. Ideally, there are consistent approaches to monitoring threats, protecting the business, and communicating with others across a wide range of threats — with the details changing for each threat category.

ACTION: Be sure your business continuity and cybersecurity personnel are acquainted and working together. Review your Business Continuity Plan and protocols with the team. Update to reflect your current threat landscape, vulnerabilities, and response best practices. 

7. Harness AI for Cyber Defense. According to a 2023 IBM report, organizations with extensive use of both AI and automation experienced a data breach lifecycle that was 108 days shorter compared to studied organizations that have not deployed these technologies (214 days versus 322 days). As quickly as cyber criminals are exploiting AI, software companies are building cyber defense systems that harness AI to better thwart their attacks.

ACTION: Have your IT and cybersecurity leaders assess the cyber defense tools you have in place. Identify gaps in the way your organization is monitoring for, identifying, mitigating, and responding to cyber threats. Explore and adopt AI-powered cyber defense tools that will strengthen your organization’s cyber resilience.  

Awareness, vigilance, and proactive moves can go a long way toward protecting your organization and workforce. The good news is that many of the most effective tools to prevent a breach are relatively easy to implement. It’s more a matter of education and action to put those tools into everyday practice.

 

If you’re looking to build cybersecurity knowledge, skills, and behaviors at your organization, download our Competency Management Toolkit to see how a competency-based approach can help. Or contact us to find out how Avilar’s WebMentor Skills™ competency management system can support your efforts.

 

RELATED RESOURCES
Secure Your Business | CISA
Resources and Guides | National Cybersecurity Alliance
How Competencies Can Strengthen Your Business Continuity and Disaster Recovery Plans | Avilar
Generative AI: Friend or Foe in The Workplace? | Tom Grobicki, Avilar CEO
The Impact of Artificial Intelligence on Competency Management | Avilar
Five Ways AI can Help Close the Skills Gaps of Your Workforce | Avilar





Source link

Related articles

Building a Standout Employer Brand:Strategies for HR Teams

Building a Standout Employer Brand:Strategies for HR Teams

April 11, 2024
What Is Total Compensation?

What Is Total Compensation?

April 10, 2024
Share76Tweet48

Related Posts

Building a Standout Employer Brand:Strategies for HR Teams

Building a Standout Employer Brand:Strategies for HR Teams

April 11, 2024
0

In today’s competitive job market, attracting and retaining top talent is more challenging than ever. One of the most powerful...

What Is Total Compensation?

What Is Total Compensation?

April 10, 2024
0

Total compensation represents the complete value of all rewards and benefits an employee receives from their employer in exchange for...

Tackle the 3 A’s – Absence, Agent Burnout, and Attrition

Tackle the 3 A’s – Absence, Agent Burnout, and Attrition

April 10, 2024
0

The role of the contact centre agent is challenging and can lead to burnout. This results in high...

WorkForce Software Announces Thirteenth Annual VISION Conference as Investments in Global Workforce Management Technology Increase for Employers in 2024

WorkForce Software Announces Thirteenth Annual VISION Conference as Investments in Global Workforce Management Technology Increase for Employers in 2024

April 9, 2024
0

LIVONIA, MI – APRIL 3, 2024 – WorkForce Software, the #1 rated workforce management solution for large employers, is excited...

South Dakota begins third round of Freedom Works Here ads with “Building in America” – Drgnews

South Dakota begins third round of Freedom Works Here ads with “Building in America” – Drgnews

April 9, 2024
0

South Dakota begins third round of Freedom Works Here ads with “Building in America”  Drgnews Source link

Load More
  • Trending
  • Comments
  • Latest
Hilarious video explains principles of economics

Hilarious video explains principles of economics

August 21, 2022
HVAC Maintenance Checklist Templates: Download & Print for Free!

HVAC Maintenance Checklist Templates: Download & Print for Free!

May 18, 2023
Public Knowledge Responds to MPA Chairman and CEO Charles Rivkin on Site-blocking

Public Knowledge Responds to MPA Chairman and CEO Charles Rivkin on Site-blocking

April 10, 2024
Policy & Politics Journal Blog

Policy & Politics Journal Blog

August 14, 2022
Policy & Politics Journal Blog

Policy & Politics Journal Blog

0
Spotlighting interpretive approaches to public policy scholarship – Dr Tiffany Manuel on intersectionality – Policy & Politics Journal Blog

Spotlighting interpretive approaches to public policy scholarship – Dr Tiffany Manuel on intersectionality – Policy & Politics Journal Blog

0
Policy & Politics Highlights collection on policy and regulation August 2022 – October 2022 –free to access – Policy & Politics Journal Blog

Policy & Politics Highlights collection on policy and regulation August 2022 – October 2022 –free to access – Policy & Politics Journal Blog

0
Special issue blog series on Transformational Change through Public Policy. – Policy & Politics Journal Blog

Special issue blog series on Transformational Change through Public Policy. – Policy & Politics Journal Blog

0
Bernstein, The greatest 5 min. in music education

Bernstein, The greatest 5 min. in music education

April 11, 2024
The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

April 11, 2024
Economic Surprises Could Fuel Fed Deja Vu for the 2010s – The Wall Street Journal

Economic Surprises Could Fuel Fed Deja Vu for the 2010s – The Wall Street Journal

April 11, 2024
Building a Standout Employer Brand:Strategies for HR Teams

Building a Standout Employer Brand:Strategies for HR Teams

April 11, 2024

Recent News

Bernstein, The greatest 5 min. in music education

Bernstein, The greatest 5 min. in music education

April 11, 2024
The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

April 11, 2024

Categories

  • Economics
  • Education
  • Public Policy
  • Videos
  • Workforce

Newsletter

© 2022 All right reserved by unemployablegraduate.com

No Result
View All Result
  • Home
  • Education
  • Economics
  • Public Policy
  • Workforce
  • Videos
  • Privacy Policy
  • Contact Us

© 2022 All right reserved by unemployablegraduate.com

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT