AI and Cybersecurity: Don’t Trust, Always Verify

Faster, cheaper and more scalable

The advancements in artificial intelligence are reshaping the landscape of cybersecurity, with AI now the single biggest force in the network. AI can discover vulnerabilities faster, it can execute highly scalable automated attacks, and it can help malware adapt and change to avoid detection or gain new capability. In cybersecurity defense, AI is used for real-time threat detection, and it facilitates automated response and triage capabilities, too. But part of the trouble comes from within, where companies are increasingly deploying AI tools without properly securing them, creating entirely new risks for businesses to consider.

The internet is run by machines

Human users versus hackers is no longer a model that applies when it comes to internet security. AI and bot traffic is growing far faster than human user traffic, and automation has given way to AI-driven fraud, account takeovers, credential stuffing and scraping and more. Large-scale attacks are far easier and cheaper to deploy, allowing a literal explosion of bots and automated traffic – machines running machines – across the internet.

You are the product

Free games aren’t really free. Even what seems to be a harmless activity can become a conduit of valuable data, conducting surveillance and recording information. Individual bits of data may not have great meaning, but in aggregate it might. The telemetry gained from devices and applications provides location information, networking and proximity data and more. The exchange of convenience or enjoyment for security and privacy is a well-known tradeoff that bad actors exploit continuously.

Identity is the new attack surface

It used to be that cybersecurity focused on the devices – the endpoints which represented the way into the network. Endpoint security is essential, yet it is the user identity which is the vulnerable element. It has been said that bad actors aren’t hacking systems any longer, they’re just logging in. This means that stolen credentials drive the majority of system breaches. Breaking into and highjacking active sessions, bypassing MFA challenges, and performing other identity-based attacks is now forcing a shift toward continuous authentication and a completely Zero Trust (never trust, always verify) security model.

Cybersecurity has never been easy, but it is harder than ever now that AI is involved. There’s a market out there for enabling the bad guys, like cybercrime as a business model. It’s organized and scalable and terrifying. More than ever before, cyber risk is tied directly to business risk, making security something far more than just IT.

Make Sense?

bunny feetJ

Preparing Your Business for Technology Outages

There is a lot of discussion today about how our children are growing up in a world where high technology is simply part of life and lifestyle.  I even read an article about how people are evolving because of the availability of information; evolving to the point where we no longer store and retrieve information, but store information on how to get information.  The article cited an example of someone who couldn’t recall the name of an actress in a movie they had seen, so the immediate response was to search for the answer on Google.  In the past, people relied upon memory and found various ways to mentally associate and store information so it was able to be recalled.  Now, there’s an app for that.

Are we losing our ability to effectively store and recall information?  Are we forgetting how to do things before we had technology to help us?  It might even make one wonder about how technology-dependent society has become. Consider the ruins of past civilizations where seemingly impossible structures are found. These structures cause questions about the technology available at the time as we wonder how they came to be.  The knowledge was there at some point but is now lost to time.

Is your business at risk from a similar fate?  Loss of business institutional knowledge and operational intelligence is often a problem, especially as a business grows. Too many companies fail to consider critical issues such as knowledge management and sustainability.  Finding ways to capture business knowledge and protect it is essential in every organization, whether small business or large enterprise.

Small businesses are often centered on an owner who started the operation, and who just knows how things are done.  The primary goal in this situation is to capture that knowledge and turn it into process.   Only through this approach may a business begin to reduce its reliance upon a single individual, a critical step in creating both sustainability and continuity in the business. In larger enterprises, process and structure are essential to keep the various parts and participants moving in the same general direction and toward the common goal.

Once those processes are established, generally using technology to support or facilitate them, is that the end of the task? 

Many businesses believe that establishing software-supported workflows and standard processes is sufficient to keep the company operating. If a major system or technology failure occurs, workers are left standing around unable to get their jobs done.  In the worst cases, there isn’t anyone in the business who really understands how to pull things back together or there is no longer access to electronically stored information necessary to continue operations. 

How would you handle things if your systems – your computers and software and systems – were no longer available to you?

While GPS and autopilot systems can bring tremendous efficiencies to the process of flying, they also can give a false sense of security that encourages complacency. If something goes wrong, the autopilot will adjust and the computer will tell you where to go, won’t it?

Here is where technology has the ability to distract pilots–and entrepreneurs–from asking themselves if they’re both focused on and capable of solving the right problems. inc.com

Every business must consider how they would address a severe information technology outage and should take steps to protect and preserve business knowledge so that there is some hope of recovery from such an event. 

Mendelson Consulting and the Noobeh cloud services teams help businesses implement efficient workflows, consistent and effective processes, and technology to secure, support and maintain operational readiness. No matter how redundant the tech is or how thorough the planning is, there is always a possibility of an outage. Owners and managers should understand how to continue operations and handle business in the event the technology fails unexpectedly.

jm bunny feetMake Sense?

J

Phishing, Cybersecurity and Your Small Business

Phishing can have a significant and often devastating impact on small businesses. Unlike larger organizations, small businesses typically have fewer resources to dedicate to cybersecurity, making them an attractive target for cybercriminals.

Small businesses can be impacted by phishing and other types of attacks in ways that might not have been considered before. Here are some of the more common ways that phishing attacks can impact the business:

Financial Loss
Phishing attacks often result in direct financial losses due to funds being stolen, fraudulent payments being made, and ransoms being paid. Cybercriminals often use phishing emails to trick employees into transferring money to fraudulent bank accounts, and attackers may impersonate legitimate vendors or clients to request fake payments. Worse, phishing emails can be used to deliver ransomware, locking up or encrypting critical systems or data until a ransom is paid.

For small businesses, even a single financial loss can be catastrophic.

Data Breaches
Phishing can lead to the compromise of sensitive business information or customer data, such as customer personal information or payment details, employee credentials or other private information of the employee, or business trade secrets and other proprietary business data. Data breaches can easily result in legal liabilities, fines, and damage to the business reputation.

Reputational Damage
When a phishing attack exposes sensitive customer information or disrupts services, it erodes customer trust. This can lead to clients taking their business elsewhere and makes attracting new customers harder. It could also impact vendor relationships, causing partners to view the business as a weak link in the supply chain.

Operational Disruption
Cyber-attacks, including phishing attacks, can disrupt business operations and cause numerous problems. Ransomware or malware delivered through phishing emails can render IT systems unusable, causing loss of productivity. If employees lose access to critical tools, files, or data, there will be delays in work and projects. Businesses also must divert time and resources to recover from attacks, taking away from regular business operations and revenue-generating activities.

Why Small Businesses Are Often Targeted
Small businesses are rich targets for cyber-attacks, especially phishing, because they often have weaker defenses compared to larger enterprises. Often made up of a few trusted employees, small businesses are attacked in ways that exploit trust and personal familiarity. Due to many small businesses having weaker cyber-defenses, attackers can find high payoffs in financial rewards or valuable data with a single successful phishing attack.

Noobeh Helps Businesses Protect Themselves
Every business should teach their employees how to recognize and report phishing emails, and MFA (multi-factor authentication) should protect all accounts, but human beings can only do so much, so it makes sense to implement tools that can put additional intelligence behind your services and defend your systems to help keep the problem from ever getting to your users.

Our team at Noobeh recommends and provisions Microsoft Defender for Office 365 to block phishing emails and messages with malicious links and content. Advanced email security helps reduce inbox spam and blocks messages from spoofed senders, which helps prevent users from interacting with bad emails and potentially exposing protected information.

Email protection is only part of the needed coverage. Noobeh also recommends having strong endpoint protection solutions to detect and prevent phishing-related malware and other attacks. Microsoft Defender for Endpoints does this, working seamlessly with our remote monitoring and management and your other Microsoft services to provide a higher level of protection for the business.

By understanding the risks and taking proactive measures, small businesses can minimize the impact of phishing attacks and protect their operations, reputation, and customers.

jm bunny feetMake Sense?

J

A Hurricane and the Port Workers Strike Force Conversation About Business Resilience and Continuity

Hurricane Helene is one of the biggest storms to have hit the Gulf Coast in years. An analysis done by a scientist at Colorado State University, Helene was larger than almost every storm that has hit the gulf since 1988. Only Opal and Irma were bigger than Helene. The toll in life and property is not small, nor is the disruption of services. There are troubles enough getting help and supplies to impacted areas, so the focus on doing everyday business just isn’t a thing.

To make matters worse, there is a strike going on right now. A big strike that is already impacting supply chains nationwide, and things will only get more strained the longer it lasts.

“The 2024 United States port strike is a labor strike involving over 45,000 port workers who are part of the International Longshoremen’s Association (ILA), impacting 36 ports across the United States primarily along the East Coast and the Gulf Coast.” (Wikipedia)

While there are many people currently facing larger life issues, the entire nation is forced to consider what happens now, and if they weren’t directly impacted by these events, what would they do if they were? It is a bit of a wake-up call for many business owners, because business interruptions can come from all angles, and it is always best to have made at least some attempt at a set of plans for when things happen.

One critical type of plan is about making the business more resilient and better able to recover or adapt. It’s a broad strategic plan that focuses on overcoming unexpected disruptions and adapting to changing conditions or circumstances. This includes addressing business continuity, which is about how operations may be maintained during a crisis. Business continuity planning is part of what makes a business resilient.

The Importance of Business Resiliency

Business resiliency has become a critical factor for success. In today’s rapidly changing world, the ability to stand up to or quickly recover from disruptions is no longer a luxury but an imperative. Resilience means being able to adapt to changes and challenges swiftly, maintaining continuity and minimizing losses. Customers want reliability, so a business that can continue to deliver products and services despite disruptions will build trust and loyalty, leading to long-term relationships and a strong reputation.

A resilient business will have contingency plans for finances, creating buffers to mitigate the impacts of short-term shocks so investments in long-term growth continue. Also, where competitors may struggle to cope, resilient companies may not simply continue to operate but even capitalize on new opportunities that arise from the changing landscape. When a business is prepared for disruptions, it can focus on growth and innovation rather than mere survival.

Technology plays a big role in developing resilience. Cloud solutions can ensure data is backed up and accessible from anywhere, cybersecurity solutions help protect businesses from cyber threats, and automation technologies streamline operations while reducing dependency on manual processes.

Prioritizing resiliency is crucial for small businesses to navigate uncertainties and thrive.

Mendelson Consulting and Noobeh cloud services help businesses of all sizes improve their agility, streamline operations and implement the technologies and services necessary to shore up business and operational continuity and improve overall resilience.

jm bunny feetMake Sense?

J

Timing is Everything: Security, AI and the Tech Stack in Restaurants

Running a restaurant or chain of restaurants is no easy task. Margins are often razor thin while customer demands continue to expand. Food service, like so many other industries, is struggling to bear the weight of change as labor shortages, rising costs, increasing cybersecurity risk, and demands for an improved customer experience push the industry to do more efficient and effective business. To keep up, businesses must learn more about what’s really going on in the operation, and to turn that insight into action. Timing is everything, and now is the right time to look at technology and platforms which will deliver greater insight and intelligence.

Whether it is leveraging commercial solutions available from partners or through building the tech stack by DIY, businesses in the restaurant industry are looking for innovative solutions to drive more profitability as well as increasing revenues leveraging resources they’re already paying for. AI is playing a big role in this evolution and businesses of all sizes, from the single-location entrepreneur to the multi-location franchise, are taking steps to incorporate it into the operation. Yet AI is all but useless if it doesn’t have the data to analyze.

An example of a transformational solution for the restaurant industry might be Curbit’s products, which include digital infrastructure and real-time AI capabilities that enable the software to analyze the data around service, real-time order progress, kitchen performance and guess sentiment. Microsoft’s Azure and Azure AI platform is key to Curbit’s innovation and development, enabling them to give the information which powers timely decision-making rather than offering only after-the-fact reports or outdated dashboard data.

In the category of maximizing the resources you’re already paying for, look at new services available through DoorDash, where lunch special and happy hour promotional offerings help businesses drive demand in off-peak times. Designed to increase revenues and drive greater sustainability, the service also reflects how restaurants are increasingly faced with the need to leverage online tools and mobile ordering to replace the reduction in foot traffic at brick and mortar location.

On the other side of that coin is information security and privacy and how businesses deal with the realities of cybersecurity threats and the need for greater levels of protection. Collecting more data for analysis means there is an increased risk of exposing private data if not adequately protected.

Considering high profile incidents like what happened with Panera, adequate cybersecurity protections must be part of the essential infrastructure that supports the operation. What was initially described as a systemwide technical outage at Panera was ultimately found to have been a cybersecurity breach exposing some employee personal data and the basis for a class action lawsuit filed by Panera employees.  

Whether it belongs to employees or customers or others, personal and private data must be protected. The cost of protecting the data is likely lower than the cost of dealing with a data breach and the potential resultant backlash, which is another part of the equation which must be considered.

Mendelson Consulting and Noobeh cloud services recognize how businesses need to modernize their systems, developing greater intelligence and resilience in the operation. We also recognize the importance of redundancy and agility in systems, and how quality managed cybersecurity solutions and services help guard against attack.

From ERP and specialized business solutions to platform, hosting and managed service, Mendelson Consulting and Noobeh cloud services can help your business meet the demands of doing business now and in the future.

jm bunny feetMake Sense?

J

Cybersecurity and Small Business

Small businesses face many challenges as they grow and expand, and chief among them is the growing threat of cyber-attack. As the company grows, its value to cybercriminals grows, too. Implementing comprehensive cybersecurity measures is essential to maintaining customer trust and safeguarding important business data against these threats.

There is a belief among small business owners that their operations are too small or insignificant to be attractive targets for cybercriminals. Cybercriminals, on the other hand, more often view small businesses as easy targets. Why is this? Largely because the bad guys know that the smaller companies aren’t spending on cybersecurity services and tools and aren’t always keeping their workers informed about ways they can participate in keeping things safe.

To help protect the business from cybersecurity threats, it is crucial to invest in some key security measures. Longer and more complex passwords, regular software patching and updating, and periodic training for employees on how to identify phishing attempts and what to do with suspicious emails is a good start. Cybersecurity efforts should scale with the business, and this requires strategic planning that is aligned with the goals and objectives of the business.

The best cybersecurity approaches are built on a secure foundation, and this is what helps to support business growth and expansion. For every business, there are four cornerstones of a solid cybersecurity foundation.

  • Identifying potential cyber threats and understanding the business risk they represent.
  • Enforcing strong password protection and role-based access controls.
  • Following best practices in cybersecurity.
  • Managing documentation and vital business information securely.

Cybercriminals know that smaller businesses generally have limited cybersecurity resources, making small businesses prime targets for phishing and malware. What is the potential impact of falling for a phishing email, or what happens if there is a ransomware attack? Each type of threat carries different levels of risk, and growing businesses should be aware of the potential financial, legal and reputational impacts when evaluating their approach.

Businesses can help their users become part of the cybersecurity plan by regularly training them on phishing methods and ways to avoid ransomware or malware. When users know more about emerging threats and how to recognize and report suspicious things, they become valuable assets in the improvement of cybersecurity of the business.

The first line of defense in cybersecurity is the username/password challenge. Many systems today use an email address as the username or user ID, which means it really isn’t much of a challenge to guess. This leaves it to the password to keep the account secure, so a strong and unique password is necessary.

Making another challenge to the authentication adds another layer of protection to the account. Referred to as 2FA or MFA (two-factor authentication or multi-factor authentication), users may be required to respond to an in-app message, provide a code received via SMS or other, or provide a code from an authenticating application to satisfy the login requirements. This additional challenge to the user identity makes it harder for cybercriminals to gain unauthorized access.

Ensuring the protection of sensitive business information requires controlling what users have access to once they are in the system. If someone were to gain unauthorized access, having appropriate role-based access controls in place would limit their ability to get sensitive data. This is often another area of vulnerability for smaller businesses that don’t implement strict document controls or structures, opting instead for an open self-service model that leaves data available to whomever can get logged in.

With businesses changing frequently, it is important to not just create a framework to limit user access, but to keep user and role-based access reviewed and updated regularly. Software and systems also need to be updated regularly. Known software vulnerabilities should be patched and security updates installed on devices, and policies enforcing updates and antivirus/malware detection should be implemented.

We understand that businesses must enhance their cybersecurity strategies to combat the growing number and type of cyber threats, and it can be challenging just figuring out what to do first. Working with a variety of technologies and specialists, we can help secure your digital environment and keep you better-protected from the bad guys.

jm bunny feetMake Sense?

J