AI Will Hit Employees’ Cyber Security

In the era of uncertainty with AI, and an increase in cyber security breaches, Yubico, a leading provider of hardware authentication security keys, recently shared the results of its 2024 Global State of Authentication survey, for Cybersecurity Awareness Month.

Conducted by Talker Research, the survey polled 20,000 people from around the world, including Australia, France, Germany, India, Japan, Poland, Singapore, Sweden, United Kingdom and the United States.

This research gauged the perceptions and understanding of the global impact of cyber security both personally and in the corporate realm.

And it explored the risks posed by inadequate security practices, the potential threat of technology like Artificial Intelligence (AI) and the impact this has on both personal and organisational safety.

The results of the survey uncovered concerning patterns and behaviours when it comes to personal and workplace cyber security, including the extensive underutilisation of multi-factor authentication (MFA) and a generally reactive approach to addressing cyber threats.

Key Global Findings Include:

  • Despite being the least secure form of authentication, the most common method of authentication is username and password
  • 58% use username and password to login to personal accounts
  • 54% use username and password to login to work accounts
  • With the rapid advancements of artificial intelligence, respondents said that online scams and phishing attacks have become more sophisticated (72%) and successful (66%)
  • Respondents show a lack of awareness of best practices for authentication
  • 39% think username and password are the most secure and 37% think mobile SMS based authentication is the most secure, both of which are highly susceptible to phishing attacks
  • 40% don’t think or aren’t sure if the online apps and services they are using are doing enough from a security standpoint to protect their data, accounts and personal information.

Even with this uncertainty, 22% have never done a personal cyber security audit (e.g. removing personal data from the Internet, installing or updating cyber security software on their devices, changing compromised passwords, etc.) to better protect themselves online

  • Respondents report the most commonly compromised passwords are on the apps and services that hold their most confidential, financial and personal information. These include:
  • Social media account - 44%
  • Payment app - 24%
  • Online retailer account - 21%
  • Messaging app - 17%
  • Banking app - 13%
  • For employees, even with security breaches increasing every year, 40% of respondents have never received cyber security training from the organisation they work for and only a small fraction (27%) believe the security options that their organisation has in place are very secure
  • When looking at the security aspect of onboarding employees, over 1/3 (34%) of respondents said they did not receive instructions to secure their work accounts with more than just a username and password when they first started at the company they work for
  • Despite the fact that every employee in an organisation is a potential target, 41% said security measures and requirements differ based on role and title at their company, leaving room for bad actors to infiltrate within several levels of an organisation

“The findings highlight the need for a holistic cyber security strategy that encompasses both home and work environments,” said Derek Hanson, vice president standards and alliances at Yubico.

“This includes adopting stronger authentication methods to become phishing-resistant, fostering a culture of security awareness through consistent employee training, and more.

“Ultimately, building a unified front against cyber threats requires a concerted effort to bridge the gap between perceived and actual security. By integrating advanced security measures into all aspects of our digital lives, we can better protect ourselves, our data, and our organisations.”

Cyber security breaches and phishing schemes aren't solely a worry for IT departments or tech-savvy individuals; they also pose serious risks to the general public, especially in the era of Artificial Intelligence (AI).

As cyber attacks and online scams become increasingly sophisticated, it is more important than ever for everyone to stay vigilant in both their personal and professional lives.

“When individuals fail to secure their personal accounts, they also put their workplaces at risk. This is why it’s crucial for enterprises to adopt a holistic approach to cybersecurity that considers the security of both work and personal environments,” Hanson continues.

For the full results of the survey, including recommendations for solutions, you can download an overview of the report here: resources.yubico.com

For more information on Yubico, visit: Yubico.

Talker Research

Press Release and CSI Edit

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« UK-US Statement On Child Protection.
ChatGPT Plus Price Hike Will Affect India »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

S21sec

S21sec

S21sec is a leading European pure play cybersecurity consultancy, services and solutions provider.

SISSDEN

SISSDEN

SISSDEN will improve cybersecurity through the development of increased awareness and the effective sharing of actionable threat information.

CyberArrow

CyberArrow

CyberArrow (formerly EBDAA) is a consultancy company providing high quality consultancy services in Risk & Compliance and Awareness & Education.

Volexity

Volexity

Volexity is a leading provider of threat intelligence and incident suppression services and solutions.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

CTM360

CTM360

CTM360 is a unified external security platform offering 24x7x365 Cyber Threat Management for detecting and responding to cyber threats.

Right-Hand Cybersecurity

Right-Hand Cybersecurity

Right-Hand Cybersecurity empowers businesses to monitor, measure and mitigate employee induced cyber risks in real-time.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

Hubify

Hubify

Hubify is an experienced, service-driven technology company specialising in business connectivity across mobile, data, voice, cloud, & cyber security solutions.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Vanta

Vanta

Vanta helps companies scale security practices and automate compliance for the industry’s most sought after standards - SOC 2, ISO 27001, HIPAA, GDPR, and other security and privacy frameworks.

Campus cyber

Campus cyber

A project initiated by the President of the Republic, the Cyber Campus is the totem site of cybersecurity that brings together the main national and international players in the field.

Strategic Technology Solutions (STS)

Strategic Technology Solutions (STS)

Strategic Technology Solutions specialize in providing Cybersecurity and Managed IT Services to the legal industry.

Anzen Technology Systems

Anzen Technology Systems

Anzen create software solutions which allows organisations to utilize the public cloud for sensitive or classified information, whilst increasing data security and retaining data sovereignty.