{"id":50177,"date":"2024-01-05T09:55:48","date_gmt":"2024-01-05T14:55:48","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=50177"},"modified":"2024-01-05T09:55:48","modified_gmt":"2024-01-05T14:55:48","slug":"cybersecurity-resolutions-2024","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/cybersecurity-resolutions-2024\/50177\/","title":{"rendered":"Cybersecurity resolutions: how to make 2024 safer"},"content":{"rendered":"<p>The rapid development of AI, international tensions, and the proliferation of \u201csmart\u201d technologies like the internet of things (IoT) make the upcoming year particularly challenging in terms of cybersecurity. Each of us will face these challenges in one way or another, so, as per tradition, we\u2019re here to help all our readers make a few New Year\u2019s resolutions for a more secure 2024.<\/p>\n<h2>Protect your finances<\/h2>\n<p>E-commerce and financial technologies continue to expand globally, and successful technologies are being adopted in new regions. Instant electronic payments between individuals have become much more widespread. And, of course, criminals are devising new ways to swindle you out of your money. This involves not only <a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-crimeware-financial-threats-2024\/111093\/\" target=\"_blank\" rel=\"noopener\">fraud using instant money-transfer systems<\/a>, but also advanced <a href=\"https:\/\/www.kaspersky.com\/blog\/illicit-code-on-legitimate-sites\/48509\/\" target=\"_blank\" rel=\"noopener nofollow\">techniques for stealing payment data<\/a> on e-commerce sites and online stores. The latest generations of <a href=\"https:\/\/thehackernews.com\/2023\/10\/silent-skimmer-year-long-web-skimming.html\" target=\"_blank\" rel=\"noopener nofollow\">web skimmers<\/a> installed by hackers on legitimate online shopping sites are almost impossible to perceive, and victims only learn that their data has been stolen when an unauthorized charge appears on their card.<\/p>\n<h4>What to do?<\/h4>\n<ul>\n<li>Link your bank cards to Apple Pay, Google Pay, or other similar payment systems available in your country. This is not only convenient, but also reduces the likelihood of data theft when making purchases in stores.<\/li>\n<li>Use such systems to make payments on websites whenever possible. There\u2019s no need to enter your bank card details afresh on every new website.<\/li>\n<li>Protect your smartphones and computers with a comprehensive security system like <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a>. This will help protect your money, for example, from a nasty new attack in which the recipient\u2019s details are replaced at the moment of making an instant money transfer in a banking app.<\/li>\n<li>Use virtual or one-time cards for online payments if your bank supports this option. If a virtual card can be quickly reissued in the app, change it regularly \u2014 for example, once a month. Or use special services to \u2018mask\u2019 cards, generating one-time payment details for each payment session. There are many of these for different countries and payment systems.<\/li>\n<\/ul>\n<h2>Don\u2019t believe everything you see<\/h2>\n<p>Generative artificial intelligence has dominated the news throughout 2023 and has already significantly affected the job market. Unfortunately, it\u2019s also been used for malicious purposes. Now, just about anyone can create fake texts, photos, and videos in a matter of minutes \u2014 a labor that previously required a lot of time and skill. This has already had a noticeable impact on at least two areas of cybersecurity.<\/p>\n<p>First, the appearance of fake images, audio, and video on news channels and social media. In 2023, generated images were used for <a href=\"https:\/\/fortune.com\/2023\/12\/04\/deepfakes-israel-hamas-war-ai-detection-tech-startups\/\" target=\"_blank\" rel=\"nofollow noopener\">propaganda purposes<\/a> during geopolitical conflicts in post-Soviet countries and the Middle East. They were also used successfully by fraudsters for various instances of <a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-consumer-threats-2024\/111135\/\" target=\"_blank\" rel=\"noopener\">fake fundraising<\/a>. Moreover, towards the end of the year, our experts discovered massive \u201cinvestment\u201d campaigns in which the use of <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/deepfake\/\" target=\"_blank\" rel=\"noopener\">deepfakes<\/a> reached a whole new level: now we\u2019re seeing news reports and articles on popular channels about <a href=\"https:\/\/www.kaspersky.com\/blog\/online-investment-dangerous-apps\/50057\/\" target=\"_blank\" rel=\"noopener nofollow\">famous businessmen and heads of state<\/a> encouraging users to invest in certain projects \u2014 all fake, of course.<\/p>\n<p>Second, AI has made it much easier to generate phishing emails, social media posts, and fraudulent websites. For many years, such scams could be identified by sloppy language and numerous typos, because the scammers didn\u2019t have the time to write and proofread them properly. But now, with WormGPT and other language models optimized for hackers, <a href=\"https:\/\/securelist.com\/story-of-the-year-2023-ai-impact-on-cybersecurity\/111341\/\" target=\"_blank\" rel=\"noopener\">attackers can create far more convincing and varied bait on an industrial scale<\/a>. What\u2019s more, experts fear that scammers will start using these same multilingual AI models to create convincing phishing material in languages and regions that have rarely been targeted for such purposes before.<\/p>\n<h4>What to do?<\/h4>\n<ul>\n<li>Be <strong>highly critical<\/strong> of <strong>any<\/strong> emotionally provocative content you encounter on social media \u2014 especially from people you don\u2019t know personally. Make it a habit to always verify the facts on reputable news channels and expert websites.<\/li>\n<li>Don\u2019t transfer money to any kind of charity fundraiser or campaign without conducting a thorough background check of the recipient first. Remember, generating heart-breaking stories and images is literally as easy as pushing a button these days.<\/li>\n<li>Install <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">phishing and scam protection<\/a>\u00a0on all your devices, and enable all options that check links, websites, emails, and attachments. This will reduce the risk of clicking on phishing links or visiting fraudulent websites.<\/li>\n<li>Activate banner ad protection \u2014 both <a href=\"https:\/\/www.kaspersky.com\/plus?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Plus<\/a> and <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a>\u00a0have this feature, as do a number of browsers. Malicious advertising is another trend for 2023-2024.<\/li>\n<\/ul>\n<p>Some experts anticipate the emergence of AI-generated content analysis and labeling systems in 2024. However, don\u2019t expect them to be implemented quickly or universally, or be completely reliable. Even if such solutions do emerge, always double-check any information with trusted sources.<\/p>\n<h2>Don\u2019t believe everything you hear<\/h2>\n<p>High-quality AI-based voice deepfakes are already being actively used in fraudulent schemes. Someone claiming to be your \u201cboss\u201d, \u201cfamily member\u201d, \u201ccolleague\u201d, or some other person with a familiar voice might call asking for urgent help \u2014 or to help someone else who\u2019ll soon reach out to you. Such schemes mainly aim to trick victims into voluntarily sending money to criminals. More complex scenarios are also possible \u2014 for example, <a href=\"https:\/\/www.vox.com\/technology\/2023\/9\/15\/23875113\/mgm-hack-casino-vishing-cybersecurity-ransomware\" target=\"_blank\" rel=\"nofollow noopener\">targeting company employees to obtain passwords for accessing the corporate network<\/a>.<\/p>\n<h4>What to do?<\/h4>\n<ul>\n<li>Verify any unexpected or alarming calls without panic. If someone you supposedly know well calls, ask a question only that person can answer. If a colleague calls but their request seems odd \u2014 for example, asking you to send or spell a password, send a payment, or do something else unusual \u2014 reach out to other colleagues or superiors to double-check things.<\/li>\n<li>Use caller identifier apps to block spam and scam calls. Some of these apps work not only with regular phone calls but also with calls through messengers like WhatsApp.<\/li>\n<\/ul>\n<h2>Buy only safe internet-of-things (IoT) smart devices<\/h2>\n<p>Poorly protected <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/internet-of-things\/\" target=\"_blank\" rel=\"noopener\">IoT devices<\/a> create a whole range of problems for their owners: <a href=\"https:\/\/www.kaspersky.com\/blog\/robot-vacuum-privacy\/46682\/\" target=\"_blank\" rel=\"noopener nofollow\">robot vacuum cleaners spy on their owners<\/a>, smart pet feeders can <a href=\"https:\/\/www.kaspersky.com\/blog\/pet-feeders-vulnerabilities\/48461\/\" target=\"_blank\" rel=\"noopener nofollow\">give your pet an unplanned feast or a severe hunger strike<\/a>, set-top boxes <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-avoid-threats-from-budget-android-devices\/49565\/\" target=\"_blank\" rel=\"noopener nofollow\">steal accounts and create rogue proxies on your home network<\/a>, and baby monitors and home security cameras <a href=\"https:\/\/www.kaspersky.com\/blog\/ip-cameras-unsecurity-eufy\/46574\/\" target=\"_blank\" rel=\"noopener nofollow\">turn your home into a reality TV show without your knowledge<\/a>.<\/p>\n<p>What could improve in 2024? The emergence of regulatory requirements for IoT device manufacturers. For example, the UK will <a href=\"https:\/\/www.legislation.gov.uk\/ukdsi\/2023\/9780348249767\" target=\"_blank\" rel=\"nofollow noopener\">ban the sale of devices with default logins and passwords<\/a> like \u201cadmin\/admin\u201d, and require manufacturers to disclose in advance how long a particular device will receive firmware updates. In the U.S., a <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2023\/07\/18\/biden-harris-administration-announces-cybersecurity-labeling-program-for-smart-devices-to-protect-american-consumers\/\" target=\"_blank\" rel=\"nofollow noopener\">security labeling<\/a> system is being developed that will make it possible to understand what to expect from a \u201csmart\u201d device in terms of security even before purchase.<\/p>\n<h4>What to do?<\/h4>\n<ul>\n<li>Find out if there are similar initiatives in your country and make the most of them by purchasing only secure IoT devices with a long period of declared support. It\u2019s likely that once manufacturers are obliged to ensure the security of smart devices locally, they\u2019ll make corresponding changes to products for the global market. Then you\u2019ll be able to choose a suitable product by checking, for example, the American \u201csecurity label\u201d, and buy it \u2014 even if you\u2019re not in the U.S.<\/li>\n<li>Carefully configure all smart devices using our detailed advice on <a href=\"https:\/\/www.kaspersky.com\/blog\/smart-home-zigbee-thread-matter-advice\/47343\/\" target=\"_blank\" rel=\"noopener nofollow\">creating a smart home<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-secure-smart-home\/47472\/\" target=\"_blank\" rel=\"noopener nofollow\">setting up its security<\/a>.<\/li>\n<\/ul>\n<h2>Take care of your loved ones<\/h2>\n<p>Scams involving fake texts, images, and voices messages can be highly effective when used on elderly people, children, or those less interested in technology. Think about your family, friends, and colleagues \u2014 if any of them may end up a victim of any the schemes described above, take the time to tell them about them or provide a link to <a href=\"https:\/\/www.kaspersky.com\/blog\/\" target=\"_blank\" rel=\"noopener nofollow\">our blog<\/a>.<\/p>\n<h4>What to do?<\/h4>\n<ul>\n<li>Don\u2019t just give blanket information from our articles; look beyond our blog to find <a href=\"https:\/\/academy.kaspersky.com\/courses\/\" target=\"_blank\" rel=\"noopener\">suitable cybersecurity lessons for your loved ones based on their age and temperament<\/a>.<\/li>\n<li>Make sure that all your family\u2019s computers and phones are fully protected. With <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a>, you can protect as many devices as needed, on any popular platform \u2014 Windows, macOS, Android, or iOS.<\/li>\n<\/ul>\n<p>Before we say goodbye and wish you a happy and peaceful 2024, one final little whisper \u2014 <a href=\"https:\/\/www.kaspersky.com\/blog\/2023-cybersecurity-resolutions\/46761\/\" target=\"_blank\" rel=\"noopener nofollow\">last year\u2019s New Year\u2019s resolutions<\/a> are still very relevant: the transition to password-less systems is progressing at a swift pace, so going password-free in the New Year might be a good idea, while basic cyber hygiene has become all the more crucial. Oops; nearly forgot: <em>wishing you a happy and peaceful 2024!\u2026<\/em><\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity trends to consider and new threats to protect against in 2024.<\/p>\n","protected":false},"author":2722,"featured_media":50178,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[1140,3716,4531,4526,658,794,187,1451,43,726,660,321,131],"class_list":{"0":"post-50177","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-ai","9":"tag-deepfakes","10":"tag-fakes","11":"tag-firmware","12":"tag-internet-of-things","13":"tag-iot","14":"tag-passwords","15":"tag-payments","16":"tag-privacy","17":"tag-scam","18":"tag-smart-home","19":"tag-technology","20":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cybersecurity-resolutions-2024\/50177\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cybersecurity-resolutions-2024\/26932\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cybersecurity-resolutions-2024\/22249\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/cybersecurity-resolutions-2024\/11319\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cybersecurity-resolutions-2024\/29598\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cybersecurity-resolutions-2024\/27105\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cybersecurity-resolutions-2024\/26948\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cybersecurity-resolutions-2024\/29534\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cybersecurity-resolutions-2024\/28381\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cybersecurity-resolutions-2024\/36782\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cybersecurity-resolutions-2024\/11959\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cybersecurity-resolutions-2024\/21367\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cybersecurity-resolutions-2024\/22136\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cybersecurity-resolutions-2024\/30800\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cybersecurity-resolutions-2024\/35516\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/cybersecurity-resolutions-2024\/28966\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cybersecurity-resolutions-2024\/27343\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cybersecurity-resolutions-2024\/33121\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cybersecurity-resolutions-2024\/32744\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/tips\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=50177"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50177\/revisions"}],"predecessor-version":[{"id":50180,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50177\/revisions\/50180"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/50178"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=50177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=50177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=50177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}