AI’s Impact on Cyber Risks

Share This TechTip

The AI buzz isn’t dying down! For Cybersecurity Awareness Month, I wanted to revisit this post from earlier this year with some small updates. Enjoy! -Ryan

Ever since AI first became more available, it’s been on the tip of everyone’s tongue. However, I still don’t hear enough people talking about the risks that exist and I want to add a bit of a unique take on it.

This post won’t get into ways you can use AI. Instead, with its potential in the back of your mind, let’s talk a little about what this means as a risk to your business.

I’ll keep this high level and help give you some ways to think about the role AI could be playing in your business (or personal use).

AI Isn’t New in Cybersecurity

AI Used in Security

You may not realize it, but you’ve likely had AI helping in some form or another to help thwart attacks.

AI and some of the ability to recognize and analyze language and behaviors has been an underlying part of newer forms of defense in Next Gen Antivirus and Endpoint Detection and Response (EDR) solutions (to name a few areas that come to mind).

Prior to leveraging AI as a tool in this way, most Antivirus solutions only had the ability to identify known malware and viruses. Newer versions of these types of solutions add the ability to not just identify what is ‘known’ but also what seems suspicious. Instead of recognizing a specific code, it’s more based on heuristics – or how a program may ‘behave’. Even in EDR, activity that sticks out from the normal use of an endpoint to suggest that something needs to be investigated further.

With enhancements to AI and these resources, we can expect to see a lot of new cybersecurity tools on the market that help take this to a new level – ultimately either stopping an attack or at least detecting it and alerting security engineers more quickly.

AI Used by Threat Actors

Attackers are always trying to stay one step ahead of our defenses. They’ve also been leveling up over the years and look to AI to help create more advanced methods of attacks and that have the potential to skirt by these leveled-up defenses.

This brings in serious threats where a social engineering or phishing attack may be better constructed. Or worse, when the technology could be used to clone someone’s voice and trick us.

AI can be used to conduct research and build better, more compelling, messages that prey upon the victim.

You can bet that, just as AI is helping to level up defenses, it’s being used just the same by threat actors to find more automated and effective ways to attack people

While I recommend learning more about these threats (or maybe we’ll save that for a future topic), today’s article is more about your direct risks of using AI in your business.

What About AI in Other Technology? Is There Risk?

The quick answer is: YES, there’s always risk! We just need to determine if it’s a benefit worth the risk and how we can mitigate the risks we accept – Risk Tolerance and Risk Mitigation.

One thing I can’t answer for you is “HOW will my AI tool be compromised?”.

I’m not sure we really know the extent of “How” yet, there are some types of attacks we’re learning about and that I’ll mention – but that’s not the question to worry about (at least not for you and I).

My thought here is that this is still an evolving threat-scape. Even with other types of technology, sometimes we don’t know how an attack could occur until after people have started using it.

Researchers do what they can to come up with things before an attacker does, but it’s a constant battle. And threat actors are known for being extremely creative. The moment we think we know everything, a new attack (called a Zero Day Vulnerability when it’s newly discovered) could appear and we’re back at square one.

We’ll have to rely on researchers and be prepared to be reactive when new vulnerabilities become known. We’re also going to need to ask our vendors how they’re staying on top of these known vulnerabilities or discovering potential vulnerabilities before they become a problem.

I say all of this because, at our level, you and I won’t really be the ones to solve the “How” question.

So, what is the question we should ask instead?

“What’s at stake IF it’s attacked? How would it IMPACT us?”

This is what we can definitely start to think about and what we can begin to answer. To do so, look to the CIA Triad of Cybersecurity as a way to think about how a compromise of an AI system could impact your business.

If you haven’t heard me talk about CIA in this sense before, it stands for Confidentiality, Integrity and Availability. Here’s how to think of it:

  • Compromise of Confidentiality – information systems and data that need to remain confidential were exposed to someone that wasn’t authorized (what do we need to keep private?).
  • Compromise of Integrity – information systems and data that we rely on to be accurate and make decisions cannot be trusted when compromised (where do we need to validate trust?).
  • Compromise of Availability – information systems and data we rely on as a function of business operations are not able to be accessed or used when we need it (what do we rely on?).

Now, more things can happen after an attack to further impact you, like cost of recovery or fines/fees related to regulations. However, the items above are things we can think about proactively and that directly attribute to the level of risk we may be taking.

With that all in mind, let’s look at how AI in other technologies could impact our business based on these measurements.

Compromise of Confidentiality

People are pretty excited to have AI help summarize and analyze data. Maybe it’s even helping to process data entry or how data flows between systems.

As these AI systems interact with data and systems that are confidential in nature, the AI models may have different means of how they store that information.

My biggest concern here is that AI doesn’t really forget. In fact, many models use your interactions to be able to improve the way the model works, and it effectively gets better as it learns.

If threat actors can either trick these systems into spitting out information that should be confidential, or if they can get into the backend database where this information could be stored, we have a problem.

My opinion here may ruffle some feathers, but when companies say that their systems are not storing this data or using it to improve their models – I don’t really buy it. They may think that, but I’m a little skeptical.

In the last several years that we’ve all been reading about cyber-attacks on a regular basis, how often has there been a factor of over-confidence by those that were eventually compromised?

Afterall, people are already coming up with ways to trick AI into sharing things it’s not supposed to, often breaking the rules that are designed to keep the program in-line and protect sensitive info.

Check out how one person was able to get ChatGPT to generate Windows Keys (this is only one of several ways I’ve seen people trick it into doing this):

Again, we don’t know all the ways of “HOW” this could occur, the questions need to instead shift back to “IF” and what that means for us.

Questions to ask about a potential Compromise of Confidentiality:

  • What data is this AI tool exposed to? (Both that it can access and that could be entered)
  • Where will data reside? How is it protected at rest or in transit?
  • Could the AI tool use information it has access to in combination with other data to create sensitive data? Maybe you only let it see partial information, could it piece together the rest of it? (Keep in mind that sensitive data may not just be about a person. It could be Intellectual Property or other forms of information that needs to stay protected.)
  • Based on the data this AI tool has, if it were ever to be accessed by an unauthorized party, what laws could this trigger? (HIPAA, PCI, others?)
  • Based on the data, how many individuals could this impact if compromised?
  • Do we have a way to identify if data from this system was exposed?

Compromise of Integrity

This is one that I think is a high area of risk for AI-based systems.

Typically, when I think of Compromises of Integrity, I think about things like Wire Transfer Fraud where a routing number gets changed. Or maybe a Business Email Compromise where the compromised account is used to impersonate someone that others might trust to launch a second attack. Worse, what about a power plant that can’t trust their readings or misinformation could result in some form of physical harm.

For AI though, what happens when the job this AI tool was supposed to do was done wrong or if the information it gave someone was wrong?

We’ve already heard stories of this happening.

Prompt Injection Attacks

Okay, here’s one of ways “How” AI can be compromised: Prompt Injection attacks. Someone enters a code or carefully crafted prompt, and the AI starts to act abnormally.

Two recent situations where this was talked about:

These were all for some fun or research, but it poses a bigger question for me:

If these are the things that the ‘good guys’ figured out, what tricks do the ‘bad guys’ still have up their sleeves and what nefarious deeds could come from this kind of manipulation?

The point being, AI can be tricked and confused to go against what it’s programmed to do.

This begs the question: What happens if I can’t trust what the AI is doing is accurate or correct?

Questions to ask about a possible Compromise of Integrity:

  • If the AI system has a Compromise of Integrity, what other systems could be impacted? (this will require some knowledge about where the AI sits in a flowchart of your information systems and data processes)
  • If you’re using AI for creative purposes, how do you know you’re not using plagiarized work? What would happen if you did?
  • Regarding how we use this AI-based system, what is the worst case if we can’t trust that it’s accurate? Does it impact customers? Could it put financials at risk?
  • Is there a way to verify information to ensure it is accurate?
  • How can we identify scenarios when there is a Compromise of Integrity and remediate the compromise quickly?

Compromise of Availability

AI is quickly filling in places in operational flow charts that are easy to delegate. It’s helping businesses drive efficiencies and level up across the board.

What happens when these newly replaced processes stop working?

A Compromise of Availability, like those seen with Ransomware or Distributed Denial of Service (DDoS) attacks, happens when systems that we rely on aren’t accessible or reliable.

This is sometimes done by a threat actor to extort money to get them back or other times just to harm the business. However, even a blackout from a natural disaster could cause this kind of outage to occur.

When you leverage AI as a critical tool, you now may find that you depend on it working.

The bottom line is that we’re putting a lot of these AI tools into processes that our business depends on, and we need to be thinking about what that exposure means.

Questions to ask about Compromises in Availability:

  • If this system is not available, what else will break in our business processes or in other integrated technology?
  • What specific processes are impacted by this? Who could this impact?
  • Do we have an alternate plan for workarounds if this occurs?
  • Will we know if this system is unavailable?
  • How quickly can we restore availability?

One More Category to Add

I mentioned a DDoS attack above and it brings to mind another situation that can be similar.

Some tools that use AI will charge you per transaction.

This depends on the tool and how it works but there are situations where, each time an AI tool is used to process something, it has a small fee.

Similar to that DDoS attack that overloads and crashes a system, someone could try to overloading something like a chat bot or other AI based tool.

Not only could the AI system go down but it may also result in expensive transactions that rack up a major bill in the process.

Now What?

As skeptical as I may sound, I see immense opportunity with AI and use it in many ways.

You absolutely should learn how to adopt it where appropriate in your business or could find your competitors and the rest of the world have left you in the dust.

The risk associated with it is not something to take lightly, and I advise you to take caution before going all-in on AI related tools.

As you consider using AI in your business, even if you have already gotten started, make sure you ask these questions that we covered above and dig deeper into just the generic lists I gave you.

Here are some tips to get you started:

  • Start to talk to your staff about both the benefits and risks related to AI.
    Make sure that you know what technology is getting used in your business and that the staff that uses these tools looks at the bigger picture. AI should be discussed in your regular Security Awareness Training plan to build an understanding of the threats it poses. (Not talking about it means it’s the wild west in your office and you may be surprised that it’s already being used by someone.)
  • Follow best practices to reduce the likelihood of an attack.
    It may feel daunting to think about all of the ways AI might be attacked. Leave that work to the researchers though and just keep an eye on things you can do to minimize the likelihood of an attack by implementing the tried-and-true cybersecurity best practices. In other words, focus on your defensive tools: MFA, good passwords, minimize the data you put in, continue to educate yourself and track what information researchers are putting out there, etc. (If you don’t know what these are yet, let me know and I’ll point you to resources you can use.)
  • Focus on what you CAN control.
    Get an understanding of your level of risk based on the Impact (the CIA of Cybersecurity will guide you). Start to think about the questions I laid out above and what that means for your particular use of AI.
  • Don’t just trust, VERIFY!
    Make sure you continue to look at the security practices your providers are using. Ask them questions about how they’re staying ahead of attacks and about ways they may be able to minimize impacts if there’s a compromise of Confidentiality, Integrity, or Availability.
  • Get help from a cybersecurity consultant.
    I hope my posts and thoughts can help you take this to another level, but this is not a path I recommend going alone. Find help from someone you can trust that can be your guide on this cybersecurity journey.

Getting Help

Whether you’re just looking for help here in this post with your own risks, or even just want to be able to talk to your clients about risks like this without getting overly technical, reach out to me for ways we can collaborate!

Resources

Read last week’s article on mitigating third-party risks for more ideas about what to think about: Mitigating Third-Party Security Risks

Also, grab my Risk Inventory Tracker for free to start collecting your service providers and other key items you should keep in an inventory. (For this week, I added an AI tracking page!)

And, check out SecureMyAgency.com for help in addressing cybersecurity and compliance in your insurance agency. We have some cool packages that give you an inexpensive way to get different types of help, or we’re also able to create something more specific to your needs.

This is being published during Cybersecurity Awareness Month, so also be sure to check out our October 2024 event page for more cool ways to learn about cybersecurity this month: rlsconsulting.co/October2024

Did you miss the Catalyit Live Session on this topic? Watch it now.

More TechTips To Explore

Cybersecurity

Pitfalls to Avoid in Your Cyber Journey

Many businesses are sitting down right now to finalize budgets and lay out their plans and goals for the new year. For those focused on creating a more formal cybersecurity approach to address cyber risk, Ryan Smith shares a few tips to help you through the process.

Read More »

Unleash Your Agency's Potential

Check out our Platinum & Premium Solution Providers.

Forgot Password?

Forgot Password?

Sign up for your free 30-day free trial!

 

Let's do this

Together

We’re thrilled to invite you into Catalyit. Fill out the form to get your free, limited access – your community awaits!

Already a Basic or Full Access Subscriber?

ALERT!

Vault videos are only visible to Full Access subscribers!

Sign in or upgrade now to unlock all Catalyit content and watch this webinar on-demand.

ALERT!

This content is only visible to Catalyit Full Access subscribers!

Sign in or upgrade now to unlock all Catalyit content.

ALERT!

This content is only visible to Catalyit subscribers!

Sign in, get started free, or upgrade now to unlock all Catalyit content.

ALERT!

Vault videos are only visible to Full Access subscribers!

Upgrade now to unlock all Catalyit content and watch this webinar on-demand.

Let's do this

 

Let's do this

Fill out the form below to get free Basic Access to Catalyit and activate your Trava account.

 

ALERT!

Solution Provider Profiles are only visible to Full Access subscribers!

Upgrade now to unlock all Catalyit content and learn more about this Solution Provider.