Real World Risk Management Practical HR Resources
welcome
Are you a new user?
REGISTER HERE





RETRIEVE PASSWORD

Ask Jack: Is AI A Threat. . . Now?

By Jack McCalmon, The McCalmon Group, Inc.

Are AI attacks a threat today or in the near future?

 

Artificial intelligence is a clear and present cyberthreat as I write. Here is one report from many different recent surveys:

The survey of more than 800 IT and security leaders around the globe reveals the role emerging technology plays in the evolving threat landscape, and how IT leaders are struggling to keep up. Survey respondents cite AI-powered attacks as the most serious emerging attack vector and the most challenging to handle. Cybercriminals are becoming increasingly sophisticated, breaking historically secure solutions and inflicting damage on vulnerable organizations across every sector. Cybersecurity is more critical now than ever before.

Ninety-two percent of respondents reveal they've seen an increase in cyber-attacks year-over-year. As cybersecurity incidents become more frequent, 95% of IT leaders say that cyber-attacks are also more sophisticated than ever – and they are unprepared for this new wave of threat vectors.

IT leaders share the emerging attack vectors they're witnessing first-hand at their organizations:
 

  • AI-powered attacks – 51%

  • Deepfake technology and supply chain attacks – both 36%

  • Cloud jacking – 35%

  • Internet of Things (IoT) Attacks and 5G network exploits – both 34%

  • Fileless attacks – 24%

IT leaders report they are ill-equipped to defeat those emerging techniques, lacking defense for:

  • AI-powered attacks – 35%

  • Deepfake technology – 30%

  • 5G network exploits – 29%

  • Cloud jacking – 25%

  • Fileless attacks – 23%

https://www.thefastmode.com/market-trends/35466-92-of-it-leaders-say-cyberthreats-are-on-the-rise-51-see-ai-attacks-for-the-first-time

 

The takeaway is that AI-powered attacks are a clear and present danger. On the other side of the coin, security firms are working to develop counter measures using AI, creating an inevitable clash at some point.

Jack McCalmon, Leslie Zieren, and Emily Brodzinski are attorneys with more than 50 years combined experience assisting employers in lowering their risk, including answering questions, like the one above, through the McCalmon Group's Best Practices Help Line. The Best Practice Help Line is a service of The McCalmon Group, Inc. Your organization may have access to The Best Practice Help Line or a similar service from another provider at no cost to you or at a discount. For questions about The Best Practice Help Line or what similar services are available to you via this Platform, call 888.712.7667.

If you have a question that you would like Jack McCalmon, Leslie Zieren, or Emily Brodzinski to consider for this column, please submit it to ask@mccalmon.com. Please note that The McCalmon Group cannot guarantee that your question will be answered. Answers are based on generally accepted risk management best practices. They are not, and should not be considered, legal advice. If you need an answer immediately or desire legal advice, please call your local legal counsel.

 

Finally, your opinion is important to us. Please complete the opinion survey:

Cybercriminals Are Using Booking.Com Refund Ploy As Bait

Everyone likes a refund, cybercriminals know this, so they are using this tactic to spread malware. We examine ways to minimize your risk.

read more

Ask Jack: Is AI A Threat. . . Now?

For months, experts have predicted that artificial intelligence (AI) will change the cyber defense landscape. Jack details a report that states it is now here.

read more

Data Compliance Audit: A Double-Edge Sword When Defending Data Security Claims

A new report claims a surge in ransomware attacks. Compliance audits are necessary to limit risk, but there is a dark side to audits if organizations are not ready to comply.

read more

"Juice Jacking" Alert: FBI Warns Of Bad Public Charging Ports

In an unusual move, the FBI warns the general public to stay clear of public USB charging ports. We explain why "juice jacking" is a threat.

read more