On Friday, April 12, our Main Branch located at 1601 22nd Street will close at 10:00 a.m. for the move to our new headquarters.

West Bank Logo

On Friday, April 12, our Main Branch located at 1601 22nd Street will close at 10:00 a.m. for the move to our new headquarters.

On Friday, April 12, our Main Branch located at 1601 22nd Street will close at 10:00 a.m. for the move to our new headquarters.

West Bank Logo

AI in Cybercrime

Artificial intelligence (AI) has become a growing topic of conversation. Because of its potential for efficiency in automating processes and informing decisions with a vast array of data, a wide range of industries have started to incorporate AI into their business models. Whenever a new technology is introduced, though, there is the potential for cybercriminals to use it for malicious activity. Keeping up to date on the ways new technology can be used for harm is an important step in protecting yourself from falling victim to cybercriminals.

Protect your Passwords

Now, more than ever, it is important to practice safe password habits. Cybercriminals can employ AI to enhance the capabilities of password-cracking algorithms. Here are some key tips to keeping your passwords safe:

  • Utilize Multi-Factor Authentication wherever possible, as it mitigates a considerable portion of the risk from compromised passwords.
  • Use a different password for every site. Repeating passwords makes it easier for criminals to access all of your accounts once they have cracked the password to one site. Consider using a password manager to facilitate the use of unique passwords.
  • Consider making your password a passphrase instead. To create a passphrase, think of a sentence that would be memorable for you, as that will increase its length and complexity. Include numbers and symbols within the phrase to increase the difficulty of cracking it.
  • Stay away from incorporating personally identifiable information in your password such as your name, birthday or account username. Including these facts can make it easier for AI-assisted cybercriminals to break into your account.

Beware of Deepfakes

The New York Times simply defines deepfakes as digital forgeries. Deepfake technology allows an individual to swap faces, voices and other characteristics of another person to convince others they’re someone they’re not. With the growth of this technological capability, criminals are able to spread misinformation in ways that can be destructive. If you are suspicious about any of the details in online content, be wary of trusting it. It may be audio or video that has been AI-generated with the goal of blackmail, disinformation, fraud, theft or other various malicious activities.

Use Email Caution

AI-assisted cybercrime is not limited to personal attacks; it can just as easily be used to target businesses. Artificial intelligence has been used to enhance phishing attacks. AI algorithms can analyze patterns of communication to better simulate an authentic email. Whether the email appears to be from a high-level executive or a business partner, be wary of opening unanticipated attachments and links. The aim of phishing attacks is to deceive the recipient into opening attachments or giving away sensitive information. If you suspect an email is fraudulent, report it through the proper channels your business has in place or contact the sender by phone to confirm the legitimacy of the email.

As artificial intelligence continues to advance, it is important to remain up to date on the technological developments and how it could affect you. While there are ways in which AI could pose a threat when taken advantage of by hackers, artificial intelligence could also prove to be a benefit to improving security efforts for companies. AI is gaining the ability to identify potentially malicious threats and scan and interpret time-consuming amounts of data to help prioritize human efforts. As technological advancements continue to change the game in security, make sure you continue to stay educated on ways to protect yourself and your data.

Share This Article

Facebook
Twitter
LinkedIn

Account Login

Account Login