Prepare For Cyber Attacks That Seem To Come From People You Might Know
Maybe you read a piece in the news last week about an AI-based system that mimicked the voice of the US Secretary of State, Marco Rubio, and contacted leaders around the world via calls and texts.
Ha ha, you say. As if. No one would do that to me, I'm not the Secretary of State.
You could be next.
We hear from executives that the most frequent attack they face is someone using the credentials of a trusted insider who tries to get money. It's easy to spot this when it's in an email. Are you prepared for a robot calling or texting you, sounding like a trusted insider, asking for money or some other action?
Your cybersecurity team needs to be able to prepare for that eventuality, because it will be an eventuality. This article explains how to prepare.
As a leader, you need to believe that your systems are being attacked even if "nothing happens." It's happening right now. Just because you didn't hear about it from the audit committee doesn't mean it didn't almost succeed.
Anything that involves digital signatures can and will be compromised. Even tech titans are finding that out the hard way, and they know better.
On the outer edge of things, check out this marvelous piece by David Ignatius in the Washington Post on how tech is changing spycraft. While nominally about intelligence gathering, this speaks to how "intelligence entrepreneurs" are using their skills to become more stealthy or expose those who don't want to be detected. Well, gangs can do the same but not for national security reasons. Instead you're the target.
Ask us how we can work with you to create systems and processes to verify that your security systems are verifiable and can anticipate next-gen attacks -- because the next gen is here, now, asking for you by name.
Comments
Post a Comment