A UK report highlights that cyber attacks targeting employees are main cause of breaches.
Recently, I have experienced firsthand the pain and worry associated with a cyber attack.
Upon reflection, it became clear that some uncharacteristically amateur errors had allowed this attack to happen. This experience led me to do some research, where I discovered that cyber attacks targeting employees are the leading cause of avoidable breaches.
This is the feature article this week and refers to UK Report that details the primary areas of weakness we all need to be aware of.
This Week’s Top Reads:
The accelerating use of generative AI may prompt U.S. action
Generative AI tools like ChatGPT do everything from write code to detect network vulnerabilities. But the tools also carry risks, which might spur government involvement.
Generative AI can create new content such as videos, audio, images, text and code. Its recent rise to prominence is thanks to ChatGPT, launched by OpenAI in November. ChatGPT is built on top of OpenAI’s GPT-3 large language learning models and uses prompts to write essays, answer questions, create software code and even look for security vulnerabilities within networks.
Businesses are beginning to explore how they can use the technology in their operations. Google and Microsoft expanded their investment into generative AI, while news outlets like Buzzfeed are testing generative AI to put together content. However, despite its capabilities, generative AI has raised concerns around copyright issues and bad actors using the tools to spread misinformation or generate fake comments and reviews.
How CIOs Can Become Artificial Intelligence Experts
The future that CIOs had been anticipating in which AI would enter the company and allow new discoveries to be gleamed from company data may not happen.
I think that we can all agree that AI is coming. In fact, it’s probably already here. AI lives in our mobile phones, in our homes in smart speakers, and if it’s not already there, it’s almost in our workplaces. What this means for CIOs is that we are going to have to adjust to a new world order. We are going to have to become AI experts. We will have to understand what AI can and cannot do. The big question that we are being faced with is just exactly how can we go about doing this?
CIOs Need To Prepare For The Arrival Of AI
CIOs can remember not all that long ago that AI was the exclusive domain of data scientists.
However, now, industries as diverse as retailing, manufacturing, finance and insurance are taking advantage of new products that make it much easier for businesses to create AI tools specific to their needs.
The 10 most promising tools for Web 3.0 development
Web 3.0 doesn’t exist yet, but there are many tools for developing apps for the next generation web and bridging the gap from today’s Web 2.0 infrastructure.
The Web 3.0 landscape encompasses a complex array of interconnected tools, applications and frameworks, all of which can help bridge the current version of the web, which is often referred to as Web 2.0, and next-generation Web 3.0 infrastructure.
It’s important to determine the goals of a project before selecting a set of tools. Web 3.0 technologies promise to solve numerous problems involving payment, decentralized supply chain applications and new business models more efficiently than classic World Wide Web technologies. Setting specific goals can help development teams create a shortlist of the right tools, libraries and apps.
Experts shared the following advice on how to choose Web 3.0 tools for a development project.
Leadership Can Prepare for Changing Business Trends With A Longer-Term Lens
Societal changes mean the expectations and needs of customers and employees are evolving. Being ahead of the game will drive business resilience and growth.
Organizational leaders are being tested like never before. From the global pandemic to business model disruption and talent shortages, every day seems to bring new challenges. In many cases, survival has been the name of the game.
But one of the big leadership questions going forward is “How can I continue to fight fires today while lighting the touchpaper for future investment and innovation?” To reposition and prepare for the longer-term world of work evolutions, leaders should consider two important factors.
The Major Areas Of Change To Focus On
Looking ahead for the year, organizational leaders are taking stock of what they’ve learned from a time of constant, urgent change and unexpected external developments.
They’re also wondering how they can ride the next curve of demand. What are the major areas of underlying change that future-focused leaders can track, interpret and use as a driver of innovation and competitive advantage?
OpenAI says ChatGPT must be regulated
To get the most ROI from your AI efforts, companies need to make sure they are not violating privacy, creating security vulnerabilities or perpetuating bias, which could open them up to lawsuits, regulatory fines and reputational damage.
OpenAI CTO Mira Murati made the company’s stance on AI regulation crystal clear in a TIME article published over the weekend: Yes, ChatGPT and other generative AI tools should be regulated.
And when asked whether it was too early for policymakers and regulators to get involved, over fears that government involvement could slow innovation, she said, “It’s not too early. It’s very important for everyone to start getting involved, given the impact these technologies are going to have.”
As many CIOs know, cyber security incidents are one of an organisation’s most significant threats. Unfortunately, these incidents have become increasingly costly and complex as technology advances rapidly.
A UK study has revealed that employee-targeted attacks are the leading cause of avoidable cybersecurity incidents. The report by Tanium delves deep into the modern security landscape, uncovering how organisations allocate resources between preventative and reactive cybersecurity strategies.
It also explores their reasons for deciding which path to pursue – a critical insight into understanding today’s IT defence environment and where the next cybersecurity investments should be made.
Phishing and security misconfigurations
Phishing and security misconfigurations are two of the most common areas that cybercriminals use to gain access to corporate networks and sensitive data.
The research found that a startling 64% of avoidable cyber incidents could be attributed to human error – namely, employees clicking on malicious links in phishing emails. Incidents such as these can have a dramatic and destructive effect on an organisation, not just its operations but also the people involved.
THE DIGITAL EYE
I hope these articles are valuable.
I am passionate about technology, and I want to share that passion with you. I believe that it’s essential for everyone to stay up-to-date on the latest trends, so I’ve set out to cover all aspects of the industry – from data analytics to blockchain and AI.
Please let me know if you want to see any other topics covered, and I would appreciate your help sharing this blog with others interested.