{"id":50464,"date":"2024-02-28T10:30:48","date_gmt":"2024-02-28T15:30:48","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=50464"},"modified":"2024-02-19T04:55:41","modified_gmt":"2024-02-19T09:55:41","slug":"interconnected-technologies-four-strategies","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/interconnected-technologies-four-strategies\/50464\/","title":{"rendered":"Four ways to prepare your business to secure AI and interconnected technologies"},"content":{"rendered":"<p>Of all business investments today, interconnected technologies \u2013 the growing network of devices, systems and applications connected to the internet and to each other \u2013 are the most vital and challenging. From artificial intelligence (AI) to data spaces to internet of things (IoT,) interconnected tech is letting enterprises gather more data, automate processes and make better decisions.<\/p>\n<p>While this \u2018<a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/industrial-iot\/28210\/\" target=\"_blank\" rel=\"noopener nofollow\">Fourth Industrial Revolution<\/a>\u2018 is propelling change in every industry, it also brings new risks and challenges in securing enterprises and safeguarding customers.<\/p>\n<p>Kaspersky\u2019s new research aims to help businesses stay ahead of the changes interconnected technologies bring, published in this 2024 report, <a href=\"https:\/\/go.kaspersky.com\/connected-technologies-enterprise-report.html\" target=\"_blank\" rel=\"noopener nofollow\">Connecting the future of business: How leaders should prepare for using and securing AI and interconnected technologies<\/a>.<\/p>\n<h2>About our interconnected tech research<\/h2>\n<p>Kaspersky surveyed 560 IT security leaders in six regions \u2013 North America (US,) Latin America (LATAM: Brazil, Chile, Columbia and Mexico,) Europe (Austria, France, Germany and Switzerland,) Middle East and Africa (META: Saudi Arabia, South Africa, Turkey and United Arab Emirates,) Russia and Asia-Pacific (APAC: China, India and Indonesia.)<\/p>\n\t\t\t\t\t<div class=\"c-promo-post\">\n\t\t\t\t\t\t<div class=\"o-row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"o-col-12@sm\">\n\t\t\t\t\t\t\t<article class=\"c-card c-card--link c-card--hor@xs c-card--small@xs\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__figure c-card__figure--small@xs c-card__figure--medium@sm\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/insight-story-generative-ai\/49221\/\" class=\"c-card__figure-link\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/10\/16055432\/KASP_INSIGHT-S2_EP1_GENERATIVE-AI-500x500.jpg\" class=\"attachment-card-default size-card-default wp-post-image\" alt=\"insight story, employer uses generative ai\" data-src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/10\/16055432\/KASP_INSIGHT-S2_EP1_GENERATIVE-AI-500x500.jpg\" data-srcset=\"\" srcset=\"\">\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__body  \">\n\t\t\t\t\t\t\t\t\t<header class=\"c-card__header\">\n\t\t\t\t\t\t\t\t\t\t<p class=\"c-card__headline\">Related article<\/p>\n\t\t\t\t\t\t\t\t\t\t<h3 class=\"c-card__title \">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/insight-story-generative-ai\/49221\/\" class=\"c-card__link\" target=\"_blank\" rel=\"noopener nofollow\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span>How businesses can use generative AI to empower employees<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<svg class=\"o-icon o-svg-icon o-svg-right\"><use xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/www.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-emagazine\/assets\/sprite\/icons.svg#icon-arrow-long\"><\/use><\/svg>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t<\/header>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__desc \">\n\t\t\t\t\t\t\t\t\t\t\t<p>Many businesses know generative AI will tangibly disrupt their industry, and some are already using it to make work more rewarding for employees.<\/p>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<footer class=\"c-card__footer\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__list\">\n\t\t\t\t\t\t\t\t\t\t\t<ul class=\"c-list-labels js-has-reading-time\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"c-list-labels__link\" href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/category\/artificial-intelligence\/\" target=\"_blank\" rel=\"noopener nofollow\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Artificial intelligence<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span class=\"js-reading-time\"><\/span> min read<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"u-hidden js-reading-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tHeadlines about the power of generative artificial intelligence (gen AI) are everywhere. But business leaders are asking, is it really that game-changing, or just a fad? And if it is a game-changer, how can you make the most of it?\r\n\r\nIn the first episode of our second season of Kaspersky's podcast Insight Story, I speak with experts Shagun Sachdeva (India,) Project Manager for Disruptive Tech at business intelligence service GlobalData Plc and Karen Quinn (UK,) Senior Director, Brand and Corporate Communications at financial software providers, Finastra.\r\n\r\n\r\n\r\nWhat is generative AI?\r\nTechTarget defines gen AI as any \"artificial intelligence technology that can produce various types of content, including text, imagery, audio and synthetic data.\" Some applications rely on Natural Language Processing so users can ask for outputs using everyday speech.\r\n\r\nWell-known examples of gen AI include OpenAI's chatbot ChatGPT and Google Bard, but current and potential business uses are near endless.\r\n\r\n\r\n\r\nShagun thinks many businesses already understand its importance. \"A recent GlobalData Plc survey found more than 50 percent of businesses expect gen AI will tangibly disrupt their industry in the next five years. 30 percent are already using gen AI tools.\"\r\nHow are businesses using gen AI?\r\n\"Business leaders are having more sophisticated conversations about how gen AI can go from an experiment to giving strong returns on investment,\" says Shagun. \"Whether it's chatbots engaging with customers, sharing financial tips and customizing financial plans based on individual spending habits. It's also generating loan options based on a user's credit profile.\"\r\n\r\nFinastra plans to develop gen AI tools for customers in future, but they've started in-house with GENAI (X,) a gen AI-based system now rolled out to their 8,000 employees.\r\n\r\n\r\n\r\n\r\n\r\n\"We use it for things like understanding and reviewing contracts, predicting behaviors and optimizing workflows,\" says Karen.\r\n\r\nShe believes that although only being used internally so far, their gen AI tools are benefiting customers. \"We can only work with the data we have to make financial decisions. Anything that can generate new scenarios, pull in more data sources or enable federated learning can only benefit.\"\r\nIs gen AI a threat to jobs?\r\nShagun acknowledges employees worry AI might replace them. \"Some of that anxiety may be justified \u2013 a Goldman Sachs report in March 2023 said AI could replace 300 million full-time jobs.\" But getting to know gen AI better may help overcome that concern. \"Lean in to the technology. Education and training is key. Start with courses like prompt engineering.\"\r\n\r\nKaren refers to a quote from economist and professor Richard Baldwin, \"AI won't take your job. It's somebody using AI that will take your job.\" In other words, it's not the technology itself that's a threat to jobs but failing to explore it and take full advantage of it.\r\n\r\nShe advises looking at the benefits of gen AI broadly. \"This is not an efficiency play. People will become more productive, but hopefully that means work is more rewarding.\"\r\nGetting gen AI right\r\nWhile generative AI offers much possibility, it also raises concerns around ethics, bias and data privacy. It is largely unregulated today and developing AI models can be resource-intensive.\r\n\r\nKaren highlights Finastra's caution. \"We rigorously tested the products, then launched a full-scale training program and disabled other tools. They're still going through testing, like panels to try and break them and make sure no sensitive data gets shared with the wrong audiences.\"\r\n\r\nShe continues, \"In brand and communications, there are copyright issues. If you're using text-to-image prompts, where is it drawing data from? We need to be very careful.\"\r\n\r\nMaterials used to train AI are often copyrighted, and whether people or businesses can copyright outputs of gen AI is subject to legal challenges in many countries, with some courts \u2013 including in the US and Italy \u2013 ruling no, at least in the case of visual arts.\r\nBalancing gen AI optimism with realism\r\nShagun feels misinformation is the biggest business risk from gen AI. \"It can fabricate 'facts' \u2013 what Google researchers call hallucinations.\"\r\n\r\nShe also recommends businesses pay attention to copyright. \"Disputes have arisen between artists and AI companies over the value of human creativity.\"\r\n\r\nData privacy and security also rate highly for Shagun. \"Large language models are trained on vast swathes of internet data. There's no data protection embedded in these systems by design or default. Training data can fail to include women, older people or marginalized groups \u2013 that's an ethical challenge.\"\r\nSecurity and generative AI\r\nAmin Hasbini is Kaspersky's Head of Research Center for its Global Research and Analysis Team (GReAT,) Middle East, Turkey and Africa. He says many employees are already using freely available AI tools, potentially without their employers knowing. \"In a 2023 Kaspersky study, we found 57 percent of workers are using generative AI to save time. This raises many security questions. What kind of data are they putting into it? Is it intellectual property, code or documents to summarize? That's a major concern.\"\r\n\r\nCybercriminals are also using generative AI to help them fool people with more realistic fake websites. In 2022, Kaspersky's anti-phishing system blocked more than 500 million attempts to access fraudulent websites \u2013 a doubling of attempts in the previous year.\r\n\r\nIt's likely cybercriminals are already using generative AI chatbot ChatGPT's ability to produce convincing texts to create automated spearphishing attacks \u2013 phishing targeted at specific people.\r\n\r\nTo protect against generative AI-based threats, Amin advises, \"It starts with awareness. Employees need to know their organization's boundaries around putting data into AI websites. Businesses need enterprise cybersecurity solutions that allow monitoring and control of devices, systems and data used within the organization.\"\r\n\r\nLeading employee cybersecurity awareness approaches include implementing a cyber champions program or targeted education as used by Heathrow Airport.\r\nGen AI's future potential\r\nWhat kinds of applications for gen AI will we see businesses pursuing in the near future?\r\n\r\nShagun believes what businesses do today will decide the future of gen AI. \"The world will look completely different by 2030. Global Data Plc estimates the AI market will be worth around 900 billion by 2030.\r\n\r\n\r\n\r\nBut that doesn't mean carelessly diving in. \"Gen AI is no magic bullet. While the enthusiasm around it is justified, prudence is imperative. We need responsible innovation,\" says Shagun.\r\n\r\nKaren imagines gen AI helping to make markets fairer. \"Gen AI has incredible potential to overcome inefficiencies, like small-to-medium business (SMB) access to trade finance. Gen AI might be able to generate or automate some of the processes for onboarding smaller companies into global trade, opening them up to a wider audience.\"\r\n\r\nShe also thinks gen AI could help solve some of the problems it's been known to introduce. \"It can help identify bias through explainability and ensure we close feedback loops that cause biases. It could also look at efficiencies in supply chains, contracts and communications and marketing. It can take out some of the drudgery and enrich the processes.\"\r\n\r\n\"We're on the cusp of understanding what gen AI can do,\" Karen says. \"Who knows what the future brings? This could be game-changing in ways we can't even imagine.\"\r\n\r\nLike Karen and Shagun, as a creative marketer, I'm drawn between mostly optimism and a little fear about what gen AI will bring. As I wrote following a gen AI talk for marketers where I heard about Karen's exceptional AI program at Finastra, I'm optimistic we can do it right.\r\n\r\nHaving the training, technologies and policies to bring the whole organization on the journey, we can use this tech to free us by shifting mundane tasks down to these somewhat smart bots. But in that shift, we may narrow opportunities \u2013 particularly for talent entering our industries \u2013 to refine their craft and learn the difference between average and distinctive output. Refined talent that generative AI lacks. For now, anyway.\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/footer>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\n<p>Respondents were either aware of or involved in cybersecurity decisions about interconnected technologies. They worked in organizations with at least 1,000 employees across many sectors.<\/p>\n<p>We asked how they\u2019re introducing and securing <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/category\/artificial-intelligence\/\" target=\"_blank\" rel=\"noopener nofollow\">AI<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/insight-story-metaverse\/47658\/\" target=\"_blank\" rel=\"noopener nofollow\">web 3.0<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/insight-story-digital-sovereignty\/49976\/\" target=\"_blank\" rel=\"noopener nofollow\">data spaces<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/smart-manufacturing-digital-twins\/40873\/\" target=\"_blank\" rel=\"noopener nofollow\">digital twins<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/audio-series\/how-could-extended-reality-transform-your-business\/48246\/\" target=\"_blank\" rel=\"noopener nofollow\">augmented reality (AR,) virtual reality (VR,)<\/a> 6G and <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/insight-story-iiot-industry\/49507\/\" target=\"_blank\" rel=\"noopener nofollow\">internet of things (IoT.)<\/a><\/p>\n<h2>Four interconnected tech preparation strategies<\/h2>\n<p>With the scale of change these new technologies will likely bring, organizations must have strategies to prepare to adopt and secure interconnected tech.<\/p>\n<p>We found organizations that felt ready to secure interconnected tech tended to adopt four strategies: Embracing security by design principles, training and upskilling their workforce, upgrading their cybersecurity solutions and striving to meet regulation and standards. Here\u2019s a little more on each strategy.<\/p>\n<h3>1.\u00a0 \u00a0 Adopting security by design principles<\/h3>\n<blockquote><p>Cybersecurity professionals should be part of the initial design process, not relegated to the final stages. This proactive approach ensures security considerations are built in from the start, often called security by design.<\/p>\n<cite><p>Head of Cybersecurity at a leading bank in Brazil<\/p><\/cite><\/blockquote>\n<p>Integrating cybersecurity into each stage of the software development lifecycle makes secure-by-design software and hardware more resilient to cyberattacks.<\/p>\n<p>Our research found leaders focused on integrating cybersecurity into development processes \u2013 dubbed Security by Design Promoters \u2013 were also better prepared to secure interconnected technologies. 50 percent of Security by Design Promoters felt prepared to secure interconnected tech, compared with 26 percent of the rest.<\/p>\n<p>Leadership teams can start promoting security by design by asking where in their design processes cybersecurity expertise is usually first involved. They may also play a role in ensuring budget for security testing during design.<\/p>\n<h3>2.\u00a0 \u00a0Training and upskilling your workforce<\/h3>\n<p>With the right cybersecurity education, staff can be a formidable line of defense against cyberattacks. Building a <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cybersecurity-champions\/35645\/\" target=\"_blank\" rel=\"noopener nofollow\">cyberaware culture<\/a> requires a strategy that empowers employees to gain knowledge and put it into practice.<\/p>\n<p>Our research found Training and Upskilling Promoters \u2013 organizations prioritizing training and upskilling their people \u2013 were better prepared to secure interconnected tech. 55 percent of Training and Upskilling Promoters felt prepared to secure interconnected tech, compared with 25 percent of the rest.<\/p>\n<p>Leaders we surveyed shared cybersecurity education approaches that worked well. They favored regular programs covering topics like cybersecurity policies and common cyberthreats, <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/heathrow-airport-cybersecurity-education\/44618\/\" target=\"_blank\" rel=\"noopener nofollow\">phishing simulations<\/a> to identify further training needs and awareness campaigns sharing best practice and real-world cyber incident examples. Leaders also emphasized user-friendly security policies, greater collaboration with the IT and security teams and demonstrating good cybersecurity practice from the top.<\/p>\n<p>Leadership teams can support training and upskilling the workforce by asking how often employees receive cybersecurity training and how the organization measures their understanding.<\/p>\n<blockquote><p>My workforce is not yet ready for interconnected technologies. They\u2019ll get there in time \u2013 it\u2019s a continuous learning process. You need a proper training plan for employees to be ready.<\/p>\n<cite><p>CISO of a leading medical company in Saudi Arabia<\/p><\/cite><\/blockquote>\n<h3>3.\u00a0 \u00a0Upgrading cybersecurity solutions<\/h3>\n<p>More devices connecting to the internet means more ways to attack. As businesses adopt these technologies, they need more advanced cybersecurity solutions, such as those with enhanced access controls, encryption and regulatory compliance.<\/p>\n<p>Our research found Advanced Cybersecurity Adopters \u2014 organizations focused on upgrading cybersecurity solutions \u2014 are better prepared to secure interconnected tech. 55 percent of Advanced Cybersecurity Adopters felt prepared to secure interconnected tech, compared with 22 percent of the rest.<\/p>\n<p>Advanced cybersecurity solutions let your business adapt to evolving threats, meet new regulation and protect critical data.<\/p>\n<p>The leadership team should ask what the organization knows about threats that suggest upgrading cybersecurity solutions, how to minimize the impact of upgrading solutions on workflows and how to ensure employees can use the upgraded tools effectively.<\/p>\n<h3>4.\u00a0 \u00a0Meeting regulation and standards<\/h3>\n<p>To avoid legal problems or reputation damage, your cybersecurity practice must meet changing standards and legal requirements.<\/p>\n<p>Our research found organizations prioritizing meeting new regulation and standards \u2014 Regulation Promoters \u2014 are better prepared to secure interconnected tech. 40 percent of Regulation Promoters felt prepared to secure interconnected tech, compared with 27 percent of the rest.<\/p>\n<p>To better meet regulation and standards, leadership teams can ask if the organization already meets all security regulation and standards, and if not, which to prioritize. You might also look at how to use cybersecurity compliance processes to build customer\u2019s <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/insight-story-digital-trust\/48090\/\" target=\"_blank\" rel=\"noopener nofollow\">digital trust<\/a>.<\/p>\n<p>Interconnected technologies bring huge business opportunities but also a new era of vulnerability to serious cyberthreats. With more data collected and transmitted, cybersecurity measures must get stronger.<\/p>\n<p>Organizations can use these four strategies to safeguard critical assets and fortify customer trust amid a growing interconnected landscape. Leaders must also resource cybersecurity well enough to enable access to new cybersecurity solutions that can meet interconnected tech\u2019s oncoming challenges.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From AI to data spaces to internet of things, interconnected tech is transforming every sector. New research outlines how to prepare your business.<\/p>\n","protected":false},"author":2552,"featured_media":50465,"template":"","coauthors":[3673],"class_list":{"0":"post-50464","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-digital-transformation","7":"emagazine-category-emerging-tech","8":"emagazine-category-enterprise-cybersecurity","9":"emagazine-tag-interconnected-technologies","10":"emagazine-tag-research","11":"emagazine-tag-security-by-design"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/insight-story-generative-ai\/49221\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/insight-story-generative-ai\/29051\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/50464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2552"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/50465"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=50464"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=50464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}