Artificial Intelligence and Cybercrime: A Promising Yet Dangerous Combination
Artificial intelligence (AI) is developing at a breakneck speed and continually finding new use cases. However, while its potential is exciting and seemingly limitless, this emerging technology presents cybersecurity vulnerabilities that can be difficult to predict, identify, and protect against.
Here are some vulnerabilities and avenues for cyber threats that AI is introducing to the world – and how organizations can protect themselves.
Planning Your AI Policy
Getting started with artificial intelligence (AI) for a small or medium business can be an intimidating proposition. Already “AI” is a glamorized marketing term used in almost every industry. AI applications in areas such as manufacturing or customer service are easy to envision. How about AI at church or for a pest control company? Yes, those are real examples! In the past year AI has moved to the forefront of almost all technology conversations. Improvement in AI technology is being driven equally by businesses and consumers. The result is too much stimulus and very little direction on how to position yourself for the change in our midst.
WINDOWS 11 - UPGRADE NOW!
Replacing or upgrading computers can be a challenging task for a small business. Computer equipment is expensive, and there is the additional issue of transitioning staff to a new computer and installing the software the way you need it. Of course, we strive to make that experience as easy as possible for our customers, but it is still a change that many would postpone until their computer reaches the end of their lifespan.
Enhancing Cyber Incident Reporting with CISA's New Services Portal
The new CISA Services Portal offers a secure platform packed with enhanced functionalities tailored for effective cyber incident reporting. One of the standout features of this portal is its integration with login.gov credentials, ensuring a seamless and secure login experience for users.
The portal is designed to cater to the diverse needs of its users. It allows for the saving and updating of reports, facilitating ongoing incident tracking and management. Moreover, users can share submitted reports with colleagues or clients, making third-party reporting more efficient.
Automating Export for Windows Events Logs with PowerShell
In Windows, the Event Viewer is the most common starting point for any activity analysis. The three core logs (Application, System and Security) provide details on information, warnings, errors and critical events. You can also configure Windows to log relevant cybersecurity activities like permission elevations and file deletions. The common issue we see is that the logs do not hold enough history for most auditing requirements. While you can increase the log sizes in Windows, this is not recommended. It will increase disk and performance demands on your servers. Also, Event Viewer is not a robust search and analysis tool. The best approach is to export your events. In this article, I take a straightforward approach to get the event logs exported to CSV files. The CSV format is much easier to work with than the proprietary EVTX Windows format. This approach does not require purchasing any software and relies solely on PowerShell. Once you have your logs exported, you can keep them as long as required and use the logs with other tools for analysis and reporting.
How’s Your Hygiene? Poor Password Hygiene Leaves Your Organization Vulnerable to Cybersecurity Attacks.
Where do you save your passwords? Sticky note? Phone? Computer? Or do you create passwords that you can memorize like your partner’s name and birthday, or the name of your company followed by the date you were hired? If you do any of these things, my friend, you have poor password hygiene.