artificial intelligenceMicrosoft recently published an interesting blog post. They stated that they are experimenting with "novel methods" to harness the power of AI to identify threats to the threat landscape and prevent them from becoming a problem.

The company is particularly focused on stopping ransomware attacks in their early stages.

They are specifically targeting ransomware campaigns that are human-operated to get even finer details. They found that human-operated ransomware attacks have certain common indicators. These commonalities can be used as a way to prevent future attacks.

Microsoft's blog post gives an example of a hacker who steals network credentials from a company. They will log in first to verify the credentials and then, once inside, they will most likely move around inside the network in ways the correct owner would not.

This allows the AI to be alerted for specific data points.

These fall broadly into three categories: device-based, graph based, or time based.

A time-based data point could be as simple as a hacker testing credentials at 3:00 AM and the original owner of the credentials logs in at 8 AM.

Graph-based patterns represent graphs of physical moves in a network space. They are plotted against the expected moves.

Device-based data points sound exactly like they are. The AI would expect the victim of stolen credentials to log in from their workstation, not some hidden laptop behind layers of proxy servers. This is suspicious enough.

Although it's a fantastic idea, Microsoft quickly points out that it is still in its infancy. It's not difficult to see how this could be an essential tool.

Things You Cannot Do To Keep Yourself Safe On The Cybernet

Cyberscams are not new. Con artists look for the "best marks" every day.

Are you convinced that you are not worthy of being targeted by online predators? You might be wrong!

Hackers don't have to know the amount of your bank account in order to gain access to it. All information is valuable, including your identity and financial data. Cyber criminals will try to reach as many people as they can. They want you to believe that you are not a target.

How can you avoid falling for scams? These are the signs to look out for!

Let's get started with "cyber hygiene", simple and common-sense methods to protect yourself online.

These are some things you can do.

  • Multi-factor authentication will make it 99 percent less likely that your accounts are hacked.
  • Make sure to update your software. Automated updates can be turned on.
  • Before you click, think before you click. A phishing email is the foundation of more than 90% cyber-attacks that succeed.
  • Strong passwords are important. Use a password manager to create and store unique passwords.
  • Expand all Sections

The very best thing your company can do is call Integrated Technology Systems for a complete cybersecurity analysis.

Integrated Technology Systems
6 East 45th Street, Suite 400
New York, NY 10017