{"id":50183,"date":"2023-12-29T10:55:58","date_gmt":"2023-12-29T15:55:58","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=50183"},"modified":"2024-01-22T09:34:48","modified_gmt":"2024-01-22T14:34:48","slug":"business-cyberthreats-2024","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/business-cyberthreats-2024\/50183\/","title":{"rendered":"Growing cyberthreats for business leaders to keep on top of in 2024"},"content":{"rendered":"<p>Just as things seemed to be settling down post-pandemic, 2023 turned out to be a year of global political upheaval, conflict and climate catastrophe. Recession impacts and <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/insight-story-smart-energy\/47732\/\" target=\"_blank\" rel=\"noopener nofollow\">rising prices for business basics like electricity<\/a> have seen <a href=\"https:\/\/www.ft.com\/content\/a5b24689-c01e-477c-a894-55ba3cc8ec42\" target=\"_blank\" rel=\"noopener nofollow\">closures rise and start-ups decline<\/a>. Congratulations are in order if your organization still has its head above water.<\/p>\n<p>The last thing any business needs in 2024 is a highly damaging and costly cyberattack or data leak. <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener nofollow\">IBM\u2019s 2023 Cost of a Data Breach report<\/a> found, \u201cThe average cost of a data breach reached an all-time high in 2023 of 4.45 million US dollars,\u201d having increased over 15 percent in the past three years.<\/p>\n<p>Keeping track of how cyberthreats are changing and adjusting your cybersecurity strategy and resourcing accordingly will help businesses avoid the punishing cost of a breach. Here are some of the changing and new threats Kaspersky researchers think you should prepare for in 2024.<\/p>\n<h2>AI-related threats<\/h2>\n<p>AI and other interconnected technologies \u2013 think augmented reality (AR,) 6G, data spaces and more \u2013 made a huge splash for business in 2023, and we\u2019ll soon be releasing some exciting new research about the impact of their widespread adoption. On top of that, we think these changes will loom large for AI in 2024:<\/p>\n<h3>1.\u00a0\u00a0\u00a0 AI tools will make scams more convincing<\/h3>\n<p>Scammers use many techniques to get past our defenses. AI tools can now effortlessly create stunning images, even designing whole landing pages. Malicious actors will, of course, use these to craft more convincing materials for fraud, like fake marketing emails and login screens. Expect fraud-related cyberthreats to increase.<\/p>\n\t\t\t\t\t<div class=\"c-promo-post\">\n\t\t\t\t\t\t<div class=\"o-row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"o-col-12@sm\">\n\t\t\t\t\t\t\t<article class=\"c-card c-card--link c-card--hor@xs c-card--small@xs\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__figure c-card__figure--small@xs c-card__figure--medium@sm\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/insight-story-ai-ethics\/50030\/\" class=\"c-card__figure-link\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/11045107\/360_insight_story_ethical_ai-500x500.jpg\" class=\"attachment-card-default size-card-default wp-post-image\" alt=\"insight story, ethical and ai, robot communicates with people\" data-src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/11045107\/360_insight_story_ethical_ai-500x500.jpg\" data-srcset=\"\" srcset=\"\">\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__body  \">\n\t\t\t\t\t\t\t\t\t<header class=\"c-card__header\">\n\t\t\t\t\t\t\t\t\t\t<p class=\"c-card__headline\">Related article<\/p>\n\t\t\t\t\t\t\t\t\t\t<h3 class=\"c-card__title \">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/insight-story-ai-ethics\/50030\/\" class=\"c-card__link\" target=\"_blank\" rel=\"noopener nofollow\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span>As AI\u2019s influence rapidly expands, here\u2019s how business ethics must keep up<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<svg class=\"o-icon o-svg-icon o-svg-right\"><use xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/www.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-emagazine\/assets\/sprite\/icons.svg#icon-arrow-long\"><\/use><\/svg>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t<\/header>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__desc \">\n\t\t\t\t\t\t\t\t\t\t\t<p>When AI can make or break your business, how do you harness its power while staying within ethical boundaries?<\/p>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<footer class=\"c-card__footer\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__list\">\n\t\t\t\t\t\t\t\t\t\t\t<ul class=\"c-list-labels js-has-reading-time\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"c-list-labels__link\" href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/category\/artificial-intelligence\/\" target=\"_blank\" rel=\"noopener nofollow\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Artificial intelligence<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span class=\"js-reading-time\"><\/span> min read<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"u-hidden js-reading-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tWe live in a world where algorithms can make decisions and data fuels innovation. It means ethical considerations are more critical than ever for business. They must balance using new technology to increase competitive advantage while preserving integrity and protecting customers.\r\n\r\nIn our podcast Insight Story, experts Tomoko Yokoi (Switzerland,) senior business executive and researcher at Global Centre for Digital Business Transformation, IMD Business School and Andy Crouch (UK,) consultant and co-founder of ethical-AI natural language processing company, Akumen, outline how AI biases can impact business and what steps they can take to ensure its fairness. Kaspersky Global Research and Analysis Team's Dr. Amin Hasbini expands on the privacy and responsible data use implications.\r\n\r\n\r\nNot all AI is created ethically equal\r\n\r\n\r\nAndy's company Akumen found a problem that needed solving. \"Scores out of five are useful, but we wanted insight from written responses like product reviews, and there was no way to do it. The team created an AI solution to identify meaning like topics, emotions and sentiment. Sentiment measures opinion \u2013 positive, negative or neutral \u2013 but emotions drive behavior. It works on text feedback anywhere, which might be about consumer goods, healthcare or anything else.\"\r\n\r\n\r\n\r\nTheir approach uses AI differently from generative AI tools like ChatGPT. \"Our AI is rule-based, human-created and human-curated. It's completely transparent and there are no algorithms as with large language models. We can dive in and make rules more nuanced if we recognize bias. With large language models, that would be complex and expensive.\"\r\n\r\nAndy expands on generative AI's limits for truly understanding people. \"We asked ChatGPT how many emotions humans experience \u2013 it said 138,000. That doesn't help us understand what drives behavior. Our platform has 22 emotions \u2013 enough to see what drives behavior. Through our partner, Civicom, we're helping the UK's national health service (NHS) to understand what patients and staff experience.\"\r\n\r\nAnd that understanding can improve lives:\r\n\r\n\r\n\r\nLarger language models use big data pools, but there are also more contained, enterprise-level tools like ChatGPT Enterprise that businesses can furnish with their own data and control how they use it.\r\n\r\nTomoko sees enterprise-level tools as useful but notes they can't do what big data can do. \"Organizations are developing new functions around AI, like data annotators, who clean data before it goes into models. But is it foolproof? The beauty of using data from everywhere is it gives you insights you otherwise wouldn't get.\"\r\nChoosing ethical suppliers\r\nLuckily for companies using AI ethically, more businesses are adopting digital responsibility policies and choosing ethics-first suppliers.\r\n\r\nTomoko gives an example. \"Deutsche Telekom has been a pioneer in AI ethics. They've trained all employees to ensure AI ethics are distributed throughout the organization. At the same time, they have about 300 suppliers and ensure it's in all their contracts. So it goes beyond the boundaries of the company.\"\r\n\r\nBut many businesses don't know where to start. Tomoko says, \"Over 250 companies have committed to AI ethics, but codified mechanisms only help if they change behavior. How can we live these principles and ideals? External experts can help, and there's a case for individuals taking responsibility, which will have a collective impact.\"\r\n\r\nShe suggests how companies frame AI ethics matters. \"You can see AI ethics as value or as compliance. If it's compliance, it will be cost- or risk-driven. But AI ethics could also be a competitive advantage.\"\r\n\r\nAndy compares AI ethics to health and safety. \"If you have a health and safety director, it's only one person's responsibility. Change won't happen unless everyone understands health and safety's importance, and especially that it drives productivity and revenue.\"\r\n\r\nThe competitive advantage is real. McKinsey research found 72 percent of customers considered a business's AI policy before making an AI-related purchase.\r\n\r\nTomoko highlights the importance of backing up policies with action.\r\n\r\n\r\nWhich AI issues should companies care about?\r\nTomoko outlines three places to look. \"First, consider the software development lifecycle. If you're considering developing an AI product, think of how it's designed. Look for bias in the data.\r\n\r\n\"Second, once it's being developed, although many companies say they're implementing AI ethics, people developing AI-driven products don't know how to apply those principles. So, look at how people use ethical principles in day-to-day software development.\r\n\r\n\"Third, we test products in controlled environments. Once it launches, ask who is monitoring it and how we ensure it doesn't gather bias and that people use it correctly.\"\r\n\r\nTomoko is part of IMD Business School and knows that what future executives learn about AI ethics will shape future companies' ethical behaviors with AI. She says, \"First, we say everyone has a responsibility to these issues that goes beyond the company. You need to be aware of this responsibility, but also be able to make others in your team aware.\"\r\n\r\nSecondly, \"What type of organizations do we want to build? We coach people to be able to handle multiple goals \u2013 not only profit but also social, environmental and ethical goals. We want them to walk away thinking of the future.\"\r\n\r\nAndy drills down into the data AI is using. \"Understand how the AI model is built. Is the data you're analyzing through that AI model ethically sourced, and are you using it ethically? The lack of transparency over large language models is rife for ethical risk and bias.\"\r\n\r\nAI training data bias can have life-threatening impacts. Poor AI translations have been found to be jeopardizing asylum claims. Andy sees retrieval-augmented generation (RAG,) which uses more proofed datasets, as part of the solution.\r\n\r\n\r\nCan we have secure and well-regulated AI?\r\nDr. Amin Hasbini. Head of Research Centre, Middle East, Turkey and Africa for Kaspersky Global Research and Analysis Team, thinks AI ethical standards are needed. \"AI won't self-define its ethics. They must be programmed with ethical standards.\"\r\n\r\nSince there is almost no way the public can evaluate, critique or improve AI ethics, regulation must play a part, according to Amin. \"We need security and safety by design, and continuous verification of it. That would require transparency, especially from big tech vendors, and letting the public influence how these technologies develop.\"\r\n\r\nHe likens the challenge to that of regulating social media. \"We're asking people to adopt technologies that can do much damage without giving them ways to ensure that doesn't happen. The same has happened before with social media, with it being used for data leaks and fake news. European Union regulation is moving fast around AI, but AI could be much more dangerous than social media \u2013 we need rules now.\"\r\n\r\nFor improved ethical data use, Amin recommends asset management controls. \"If well deployed, asset management controls allow data to be classified, including which is available to AI, which can be shared publicly and which needs to stay inside the organization.\"\r\n\r\nAndy says regulation is hard in this fast-moving space because no one knows what's coming next. \"I question anyone saying they know what will happen in the next six months or beyond. But there's a lot of fear and lobbying going on \u2013 so go slow. If your AI-driven capability can't deliver because it's non-compliant, ethically or otherwise, it will be damaging.\"\r\n\r\nHowever, he believes regulation is necessary. \"It will be interesting to see how they regulate something that's not easily defined and morphs quickly, but we must protect those who need protecting.\"\r\n\r\nKaspersky has recently proposed six principles for ethical use of AI in the cybersecurity industry with transparency at the core.\r\nGetting started with AI ethics\r\nOur experts have straightforward advice for those business executives yet to approach AI ethics.\r\n\r\n\r\n\r\nTomoko says, \"As a mindset, remember the analog and digital worlds are the same. Your analog-world values should extend into the digital world.\"\r\n\r\nAndy highlights the need for both widespread knowledge and deep expertise. \"Get your whole team conversant with AI, but have a well-informed friend who lives and breathes this stuff to call when there are challenges.\"\r\n\r\nWith headlines about AI taking our jobs and AI founders like Geoffrey Hinton sounding the alarm on unregulated AI perils, it's easy to write off AI ethics as a problem too hard to fix. But these complex issues need priority.\r\n\r\nThere are green shoots of change. In December 2023, the AI Alliance launched to focus on developing AI responsibly, including safety and security tools. Its 50 members include Meta, IBM, CERN and Cornell. The message may be, 'Let's not move too fast and not break things.' With OpenAI, creators of ChatGPT, not invited to the party, could the tortoise of collective corporations beat the nimble hare of innovation?\r\n\r\nAI gives business potential for great gains but comes with great risks to reputation, security and privacy. With strong ethical AI policies translated into action and widespread knowledge among employees, businesses can have more confidence to take advantage of AI's many benefits.\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/footer>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\n<p><strong>What to do about it:<\/strong> Improve your employee cybersecurity awareness education to help them become more vigilant to potentially fraudulent content. Use robust antivirus software to block scam emails and warn about suspicious websites.<\/p>\n<h3>2.\u00a0\u00a0\u00a0 Concerns about pre-trained AI models will rise<\/h3>\n<p>As more organizations start using AI chatbots and large language models (LLMs) to help professionals with their work, privacy and security concerns around the data fueling these models will rise, especially in large businesses that deal with a lot of information. And for good reason \u2013 training common LLMs often relies on public datasets containing sensitive information, raising uncertainty about whether corporate data fed into these models will stay confidential or be used to train the model further.<\/p>\n<p><strong>What to do about it: <\/strong>Businesses must adopt policies limiting how employees can use AI products and educate staff about these policies to reduce the risk of data leaks. They may also adopt Private Large Language Models (PLLMs) \u2013 these models are trained only with datasets owned by the organization using them.<\/p>\n<h3>3.\u00a0\u00a0\u00a0 AI regulation will ramp up<\/h3>\n<p>More countries and international organizations will join efforts to regulate AI in the coming year, especially African and Asian nations that are engaged in discussions but haven\u2019t yet begun regulating AI domestically. Those already involved will expand regulation, adopting more specific rules, for example, around creating training datasets and using personal data.<\/p>\n<p>With their experience developing and using AI, businesses can offer invaluable insight for discussions on AI regulation. Policymakers worldwide are actively seeking input from businesses, academia and the public on shaping AI governance.<\/p>\n<p>In 2023, the <a href=\"https:\/\/www.gov.uk\/government\/publications\/ai-safety-summit-2023-the-bletchley-declaration\/the-bletchley-declaration-by-countries-attending-the-ai-safety-summit-1-2-november-2023\" target=\"_blank\" rel=\"noopener nofollow\">Bletchley Declaration<\/a> promoted greater uniformity in AI regulation. But with rising geopolitical tensions, cooperation between countries may reduce, derailing efforts to keep it consistent.<\/p>\n<p><strong>What to do about it: <\/strong>Ensure your business is staying ahead of developments in regulation and planning for how it will comply. Take opportunities to get involved in developing AI regulation.<\/p>\n<p><a href=\"https:\/\/securelist.com\/story-of-the-year-2023-ai-impact-on-cybersecurity\/111341\/\" target=\"_blank\" rel=\"noopener\">More 2024 AI security predictions from Kaspersky researchers<\/a><\/p>\n<h2>Financial services threats<\/h2>\n<h3>4.\u00a0\u00a0\u00a0 Fraudsters will target direct payment systems<\/h3>\n<p>Cybercriminals will exploit increasingly popular direct payment systems like Brazil\u2019s <a href=\"https:\/\/www.bcb.gov.br\/en\/financialstability\/pix_en\" target=\"_blank\" rel=\"noopener nofollow\">Pix<\/a>, the US\u2019s <a href=\"https:\/\/www.frbservices.org\/financial-services\/fednow\" target=\"_blank\" rel=\"noopener nofollow\">FedNow<\/a> and India\u2019s <a href=\"https:\/\/www.npci.org.in\/what-we-do\/upi\/product-overview\" target=\"_blank\" rel=\"noopener nofollow\">UPI<\/a> for fraud. We\u2019ll also see more <a href=\"https:\/\/www.nicehash.com\/blog\/post\/psa-beware-of-clipboard-malware\" target=\"_blank\" rel=\"noopener nofollow\">clipboard malware<\/a> \u2013 malware that steals data users copy to their clipboard \u2013 designed to attack new direct payment systems. <a href=\"https:\/\/www.kaspersky.com\/blog\/mobile-banking-trojans-faq\/13243\/\" target=\"_blank\" rel=\"noopener nofollow\">Mobile banking trojans<\/a> will increasingly exploit these systems as a quick and efficient means of cashing out ill-gotten gains.<\/p>\n<p><strong>What to do about it: <\/strong>Direct payment systems have enormous benefits for business but must be appropriately secured. Businesses can also educate customers to help reduce their likelihood of accidentally downloading clipboard malware or mobile banking trojans \u2013 often disguised as legitimate apps in trusted app stores.<\/p>\n<h3>5.\u00a0\u00a0\u00a0 Mobile Automated Transfer Systems (ATS) will spread worldwide<\/h3>\n<p><a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/online-banking-theft\" target=\"_blank\" rel=\"noopener nofollow\">Mobile Automated Transfer System (ATS)<\/a> attacks are fairly new and involve banking malware making fraudulent transactions when the user logs in to their banking app. Mobile ATS has only been seen in Brazilian malware types but could go global in 2024.<\/p>\n<p><strong>What to do about it: <\/strong>Those who make banking apps must ensure their security is capable of defending against Mobile ATS.<\/p>\n<h3>6.\u00a0\u00a0\u00a0 Brazilian banking trojans will also keep spreading<\/h3>\n<p>Cybercrime originating from Brazil is well-known to be growing. As many Eastern European cybercriminals have shifted focus to ransomware, Brazilian banking trojans will fill the void left by desktop banking trojans. <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/grandoreiro-trojan-targets-global-banking-customers\" target=\"_blank\" rel=\"noopener nofollow\">Trojan Grandoreiro has already targeted more than 900 banks in 40 countries<\/a>.<\/p>\n<p>Grandoreiro attacks start with a malicious link in a phishing email, including fake shared documents, utility bills and tax forms. It then harvests data using keyloggers, screen-grabbers or overlays on online banking login pages.<\/p>\n<p><strong>What to do about it: <\/strong>Despite the growing sophistication, cybersecurity awareness education still helps employees and customers avoid falling prey to phishing. Businesses must also make sure users feel comfortable reporting their suspicions.<\/p>\n<p><a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-crimeware-financial-threats-2024\/111093\/\" target=\"_blank\" rel=\"noopener\">More financial services cybersecurity predictions for 2024<\/a><\/p>\n<h2>Advanced persistent threats<\/h2>\n<h3>7.\u00a0\u00a0\u00a0 Creative exploits of wearables and smart devices will grow<\/h3>\n<p>In 2023, Kaspersky discovered <a href=\"https:\/\/securelist.com\/trng-2023\/\" target=\"_blank\" rel=\"noopener\">Operation Triangulation<\/a> \u2013 a stealthy new espionage campaign targeting Apple devices. Kaspersky\u2019s investigation found five vulnerabilities in Apple\u2019s operating systems that affect everything Apple \u2013 from smartphones to wearable devices to smart home gadgets like Apple TV and Apple Watch.<\/p>\n<p>In 2024, we\u2019ll see more advanced attacks on consumer devices and smart home technology, including other operating systems.<\/p>\n<p>Devices like smart home cameras and connected car systems are attractive for threat actors because of their surveillance potential and tendency to run on outdated software, which makes them easier to attack.<\/p>\n<p><strong>What to do about it: <\/strong>Secure your business Internet of Things (IoT) devices and ensure that if they don\u2019t need to connect to the internet, they don\u2019t.<\/p>\n<h3>8.\u00a0\u00a0\u00a0 Supply chain attacks-as-a-service: Bulk-buying access<\/h3>\n<p>There is a growing trend of <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/supply-chain-attacks-austin\/43446\/\" target=\"_blank\" rel=\"noopener nofollow\">attacking businesses through their suppliers<\/a>. Small and medium companies that may lack advanced protection become gateways for hackers to access the data and infrastructure of big players. 2022 and 2023 saw <a href=\"https:\/\/www.wired.com\/story\/okta-support-system-breach-disclosure\/\" target=\"_blank\" rel=\"noopener nofollow\">breaches through identity management company Okta<\/a>, which serves over 18,000 customers worldwide.<\/p>\n<p><strong>What to do about it:<\/strong> Supply chain attacks expert Eliza-May Austin has great advice on preventing supply chain attacks in this Tomorrow Unlocked video:<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/b8EQ38foXLU?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<h3>9.\u00a0\u00a0\u00a0 More attacks on Managed File Transfer systems<\/h3>\n<p>Managed File Transfer (MFT) systems that let businesses securely exchange sensitive information with partners have become a cornerstone of organizational efficiency. But housing confidential information like intellectual property, financial records and customer data puts them in the crosshairs of cyber adversaries.<\/p>\n<p>MFT systems\u2019 intricate architecture and integration into business networks also means potential security weaknesses. In 2023, MFT system incidents involving <a href=\"https:\/\/www.isaca.org\/resources\/news-and-trends\/isaca-now-blog\/2023\/sizing-up-some-of-the-spookiest-cybersecurity-incidents-of-2023\" target=\"_blank\" rel=\"noopener nofollow\">MOVEit<\/a> and <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/06\/ransomware-review-june-2023\" target=\"_blank\" rel=\"noopener nofollow\">GoAnywhere<\/a> confirmed this.<\/p>\n<p><strong>What to do about it:<\/strong> Undertake comprehensive reviews of your MFT solutions to identify and reduce security weaknesses. Implement robust Data Loss Prevention (DLP) solutions, encrypt sensitive data and build a <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cybersecurity-champions\/35645\/\" target=\"_blank\" rel=\"noopener nofollow\">cybersecurity awareness culture<\/a> among employees.<\/p>\n<p><a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-apt-predictions-2024\/111048\/\" target=\"_blank\" rel=\"noopener\">More advanced persistent threat predictions for 2024<\/a><\/p>\n<p>With attention to where threats will likely grow, the year ahead need not be daunting for business. From getting ahead of AI regulation to improved cybersecurity awareness education, organizations of all sizes can stay secure even as threats grow.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2023, the speed of changing technology reached fever pitch, with AI and metaverses taking center stage. And it\u2019s brought in a new threat landscape for 2024.<\/p>\n","protected":false},"author":2552,"featured_media":50184,"template":"","coauthors":[3673],"class_list":{"0":"post-50183","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-enterprise-cybersecurity","7":"emagazine-category-safer-business","8":"emagazine-category-threat-intelligence","9":"emagazine-tag-predictions"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/insight-story-ai-ethics\/50030\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/insight-story-ai-ethics\/29525\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/50183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2552"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/50184"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=50183"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=50183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}