Fine Tuning A GPT Model
When we look back on 2024 regarding technology advancements and changes, there is likely one prevalent topic that will continue to pop up: AI. This year has been defined--and perhaps even...
For more than a century,¹ artificial intelligence (AI) has been a specter in the pop culture zeitgeist. Stories about creations overthrowing their creators have instilled in us a fear that we may be getting too advanced: We may be putting in motion a creation that will soon refuse to be controlled. We may be—right now—creating our very undoing.
Bret Arsenault,² Microsoft’s Chief Information Security Officer, doesn’t disagree.
In an era where the speed, scale, and sophistication of cybersecurity attacks aided by AI have changed the landscape of what it means to build a good defense, Bret points to several causes for alarm:
But through the darkness, there is light.
As long as there have been innovations, there have been advances in crime. A unified mail system? Mail fraud. Telephony? Telephone fraud. Financial services? Financial fraud. Internet? Cyber fraud. Bret contends that this is simply a new form of the same fight and sees his role as helping people and companies to protect themselves. In his talk at Microsoft Ignite,4 Bret laid out four common pitfalls that you want to avoid in your cybersecurity journey:
The biggest mistake a company can make with cybersecurity in the age of AI is to say, “We don’t understand it, and we don’t want to do it.” As platforms shift there are risks, but there are even greater opportunities. The recent progression to cloud-based computing has led developers to code faster and more efficiently using new tools like open-source coding. The use of distributed cloud computing has opened up avenues to scale that were previously unheard-of, enabling the Microsoft team to process more than 65 trillion security events per day.
Every new product produced by Microsoft or anyone else should be secure by design, secure by default, and secure by deployment. Make it easy for users to make the right choice! Microsoft’s shift to make multifactor identification (MFA) an opt-out for users, rather than an opt-in, resulted in unprecedented levels of compliance.
Many of the methods we’ve used to secure our companies are still invaluable. The big three are having a strong ID, ensuring good device health, and enabling pervasive telemetry. I’ll expand a bit on strong ID below but suffice it to say that you want to be sure a user is authenticated and that they are who they say they are. It may seem like common sense, but older technology is easier to break into if for no other reason than the fact that bad actors have had more time to practice. Keeping devices up to date with the latest updates and security patches is key to supporting a strong cyber defense. And, finally, you won’t be able to stop an attack if you don’t know it’s happening. Pervasive telemetry—that is, continuous monitoring of the environment, collecting data, and reporting it for analysis—is a must. Collecting and monitoring usage data can help thwart an attack that comes from an unexpected part of the globe or otherwise violates expected user behavior.
MFA remains a cornerstone of cybersecurity policies; 80% of cyberattacks can be thwarted by instituting MFA. The guidance now is to expand on that by not only instituting MFA for all users, but encouraging companies to invest in phishing-resistant MFA5 and token binding,6 a protocol that ensures a security token is usable only from the intended device.
It used to be that the mere mention of MFA would trigger a collective groan in an organization. Anyone who’s spent a significant amount of time online can tell you how they’ve seen passwords evolve from short and simple to increasingly long and complex with a variety of letters, numbers, and symbols. It doesn’t have to be this way. Identification via biometric markers such as fingerprint or face recognition may well mean that the password era is coming to a close. After all, Microsoft’s employees haven’t used passwords in years.
Avoiding these four pitfalls may seem easier said than done. Where does a small company even start? Cloudforce has become a leading Microsoft partner helping institute cybersecurity policies, practices, and cutting-edge tools for our clients in every industry. If you’d like to hear more about how to work with our team to discuss your organization’s cybersecurity posture, let’s connect!
______
[1] The Czech Play That Gave Us the Word ‘Robot’ | The MIT Press Reader
[2] Bret Arsenault (microsoft.com)
[3] Cybercrime surpasses illegal drug trade and we still don’t think it’s a big deal (updated) | CSO Online
[4] How we secure the Microsoft estate
[5] Require phishing-resistant multifactor authentication for Microsoft Entra administrator roles | Microsoft Learn
[6] Token protection in Microsoft Entra Conditional Access | Microsoft Learn
When we look back on 2024 regarding technology advancements and changes, there is likely one prevalent topic that will continue to pop up: AI. This year has been defined--and perhaps even...
Artificial Intelligence (AI) isn’t the future; it’s happening now—like RIGHT now. From virtual assistants to algorithms powering the apps we use every day, AI is reshaping EVERYTHING around us...
AI—it's arguably the single largest paradigm shift in technology since the mobile boom almost 20 years ago. In fact, with the capability and capacity to redefine how organizations, entities, and...