Navigating AI & Cybersecurity: Challenges and Opportunities
In this blog, our team of experts have put their heads together to profile the double-edged sword that is AI in cybersecurity, exploring both the challenges and possibilities it opens up.
Failed IT security horror stories and the cost to organisations are common. From data breaches such as 100 million Facebook users being exposed to the internet, to outages and ransomware attacks, the threats and counter-attacks grow daily.
Organisations affected face a huge bill to restore the damage. Last year, a Government survey revealed almost half of UK businesses had suffered cyber or security breaches, most costing thousands of pounds. Some businesses fail following a cyber-attack, especially when reputational damage cannot be restored.
The Government’s Cyber Essentials scheme was started in 2014 to help companies of all sizes improve their cyber security. It’s claimed that fulfilling the basic steps will reduce the risk of an attack by 80 percent.
Certification is given to businesses that complete the scheme, proving their commitment to protecting data from cyber threats; it’s one reason why ITRM will become Cyber Essentials certified, to reassure our clients that our treatment of their data is in safe hands.
Recently the Vectra 2019 Spotlight Report on Healthcare identified Internet of Things (IoT) devices, unpartitioned networks and outdated systems as more likely to be exploited by cybercriminals looking to steal personal information and disrupt organisations.
This means that WannaCry style ransomware attacks which cost the NHS £92 million in 2017 are less prevalent as it’s easier for criminals to attack HTTPS tunnels, as these often look like service provider traffic. Having said that, organisations should still monitor for ransomware as well as spyware.
However useful IoT might be, the security risk it poses is clear.
According to Willis Towers Watson employee negligence is responsible for 66 percent of cyber breaches. And yet, it appears some are keener to access the convenience of these devices than consider the security risks.
For businesses, using IoT on a network requires a totally different approach to security to the one required for laptops and smartphones. Mishandled, a failure to secure enterprise IoT could cause untold damage as one US casino found out, after hackers pinched its high-roller database via the smart thermostat of a fish tank in the lobby.
Analysts predict the global cloud computing market will grow by 20 percent this year to exceed $200 billion, while Citrix recently suggested that the term cloud will no longer be required as it becomes the everyday computing model.
Businesses with on premise systems coming to the end of their life will inevitably want to switch to cloud hosting. But the most important issues will be, how best to store vast amounts of data, as well as remote access for staff, partners, suppliers and so on.
While cloud providers have improved their own security protocols, the bigger danger to cloud security is the end user.
It might sound overly simplistic to talk about firewalls, anti-virus, software passwords and suchlike but actually, these more basic security features are still being overlooked and yet, are relatively easy to rectify.
With the move towards cloud and more people requiring access, the need for basic security to be in place, is even greater.
Strong passwords feature highly if organisations are to have any chance of keeping sensitive data safe. This often means needing to train staff on the importance of only accessing such systems from secure locations and ensuring remote locations, such as home computers, meet certain security standards. So too, a bring your own device (BYOD) policy is critical to ensure hardware safety throughout your organisation.
While nobody wants to think about a worst case scenario it’s always best to be prepared, should the worst happen.
Most companies will have a disaster plan but the IT version isn’t always up-to-date. Being able to immediately detect and respond to a threat is the best way to ensure damage is limited and data is recoverable. The simple fact is that, given the sheer number of attacks businesses are facing, it’s no longer a case of if but more a case of when.
Stay on top of the latest cybersecurity threats to your network by getting a free consultation with the experts at ITRM today to ensure you’re as secure as possible.
In this blog, our team of experts have put their heads together to profile the double-edged sword that is AI in cybersecurity, exploring both the challenges and possibilities it opens up.
For many small business owners, managed IT support is often misunderstood as a luxury only larger companies can afford. For that reason, most small businesses and startups fail to see the value in outsourcing IT support services. However, this blog will detail the reasons why that shouldn’t be the case.
By clicking “Accept all cookies”, you agree ITRM can store cookies on your device and disclose information in accordance with our Cookie Policy.
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer.