Artificial intelligence: a new weapon against cyber criminals

Employees' accidental or malicious actions lead to data leaks and system compromises. Prevention includes advanced technology to monitor and identify normal behavior.

In its „2022 Cost of Insider Threats: Global Report„, the Ponemon Institute pointed out that the number of incidents related to insider threats increased by 44 % in the past two years. The costs per incident increased by more than a third to $15.38 million.

Insider threats often come from employees who cause harm accidentally (as a victim of a social engineering attack) or maliciously (committing an intentional crime). A Pegasus Airline employee, in particular, misconfigured a database and, as a result, inadvertently released 23 million records of personal data onto the Internet. A total of more than 8,000 sensitive files were stolen from General Electric by a malicious employee over eight years. Whether the incident is accidental or intentional, the result is usually that confidential data is leaked or corporate systems are compromised or unavailable for a certain period.

Companies can prevent insider threats most effectively by using advanced technologies to determine what constitutes normal behavior and continuously monitor activities within the organization. For Central European Automation Holding (CEAH), cyber security has not been just a technical IT issue for a long time. Cyber security must enable the business while advocating for safety.

SHARE THIS

More articles...

International Industrial Fair Brno 2024

Central European Automation Holding (CEAH), a leader in industrial automation, is set to exhibit its cutting-edge solutions at the International Industrial Fair Brno 2024.

One for all, all for one: Interview

The longest journey begins with the first step: this could even have been the motto of the Central European Automation Holding (CEAH), which brought together the four member companies in a joint stand.

Cyber threats on the rise

Cybercriminals are targeting both IT and physical supply chains, launching mass cyberattacks, and devising new ways to extort money from businesses.