The AI Future: Three Tips For SMBs

The coming twelve months may be the most consequential ever in cybersecurity for SMBs. The advent of widespread GenAI tools will empower both legitimate users as well as criminals to do more, faster, and more creatively.

Larger organisations are likely to have their AI principles, sandbox implementations, and be forging ahead with use cases. But for SMBs, there’s a massive need to become proficient in using the best tools, processes, and training to ensure they don’t fall victim to the scale and sophistication of AI-powered fraudsters and thieves.

And that’s leaving aside the worries about falling behind if they don’t adopt AI-driven business processes as fast as competitors.

No matter the type of business, AI and automation will disrupt it. Every organisation has some digital footprint that could be tweaked with automation, or a digital presence to be defended from cybercriminals and incidents. As the government suggests, the risks of data poisoning, hijacking outputs, stealing or corrupting data, money, or processing time, are realistic. But smaller firms face a bigger challenge in coming to grips with and preparing for both the potential risks and rewards of the AI-driven future.

Prepare For The Upsides

Firstly, note that AI will be just like any other technology in having both positive and negative effects that are hard to predict. As a relic of AI’s foretelling in science fiction, the concept has been around for decades, likely contributing to both highly positive and negative expectations.

But AI is already bringing many upsides. Businesses needn’t only focus on the generative AI popularised by ChatGPT and Midjourney, which became the standard bearers for the GenAI explosion into popular culture. AI is also present in other forms, within more constrained business software, quietly supporting tasks like error-correcting, pattern spotting, and forecasting. It’s using the power of data analysis to provide answers to questions, sometimes questions that haven’t been asked, or that teams might not even be able to phrase.

SMBs without a plan to incorporate tools that make use of AI, in any form, should think about what they would do if competitors became an arbitrary percentage more efficient, faster, or more customer focussed by their own adoption.

That’s the reality now, as AI-driven business software finds incremental ways to improve the power of their teams.

Success comes most immediately from finding limited use cases where there’s a proven need for a helping hand. HR may need help sifting through applicant submissions. The tech team may need help managing, triaging, and prioritising infrastructure and SaaS alerts. The sales and marketing teams may be crying out for a helper to organise meetings, transcribe calls, and send leads down the pipeline without requiring laborious typing.

Prepare For The Downsides

Cybersecurity has evolved with the changing nature of malicious threats. AI is helping cybercriminals, too. Small businesses should be alert as much as multi-nationals. This year the news broke that an employee transferred $26m to scammers. They thought it was all signed off by their CFO because they had been on a video call with deepfakes of their colleagues. Today, that is a tactic being employed against large firms. Just as with every trick, once it has been refined, less advanced criminals will be employing it against smaller targets as part of cybercrime-as-a-service attacks.

Strong data security, device, and endpoint security, and more than minimum compliance standards must be employed by every business.

For smaller businesses, knowing staff and customers will become key. Digital identity and access management, liveness detection, and trust management are essential to understand and implement.

There is good news about the bad news. By staying up to date with evolving technology and security trends, and ensuring the business SaaS solutions are current, SMBs should be able to source enterprise-level security. But they must proactively explore the risks and topics involved and train and challenge staff in the correct procedures - and what to do with even the smallest of red flags.

Find expert support and listen to best practices on every aspect of the AI future: technology, people management, training, and right-sized business processes.

A deepfake of the boss might be utterly convincing, but if it’s already been discussed that they never request sensitive data, or money movements, except over a certain app, or without confirming via two methods, staff will stick to safe behaviour.

Prepare For A People-centric Future

It might seem strange to focus on people, but that’s exactly what AI will allow SMBs to do. The right AI use cases will abstract pain points away from customer-facing teams and empower business service roles. This matters more the smaller the business, where every success counts for more than at larger organisations with more hands.

The employee experience will define who will want to work for you. The personalised experience offered to customers will set the business apart. The right creative solution will appeal to the new prospect, unhappy with their current provider. All that rests on empowered people, able to offer the best of themselves because their toil has been removed with automation extending reach and speeding activity. They can give the best of themselves to human tasks, being creative, empathetic, and strategic.

The Future Is Now

SMBs can see the near future more clearly than we could at the dawn of the personal PC age, the mobile age, or the cloud age. The AI age has been well forecast.

The challenge for SMBs now is to: 

  • Grasp the nettle and ensure that their risk and security profiles are well understood and managed before deepfakes, fraud, and novel attacks find them.
  • Grow familiarity and success with defined use cases, building expertise in the business.
  • Make sure the technical is in service to the personal, using AI for defined business purposes, improving every stakeholder experience, and defining what great outcomes look like.

John Mutuski Is Chief Information Security Officer at Pipedrive

Image: CreativaImages

You Might Also Read:

Understanding The Threats & Opportunities Posed By ArtificiaI Intelligence:   

DIRECTORY OF SUPPLIERS - AI Security & Governance:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Mitigating The Growing Insider Risk
City Of Leicester Council Attacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Echelon

Echelon

Echelon Company is a provider of information security services specializing in certification of security software and hardware products in Russia.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Muninn

Muninn

At Muninn (aka Wehowsky), we specialize in mitigating potential risks within your network, providing one of the leading network detection and response (NDR) solutions on the market.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

Cybercrime Support Network (CSN)

Cybercrime Support Network (CSN)

CSN is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime.

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

Trusted CI

Trusted CI

Trusted CI, the NSF Cybersecurity Center of Excellence is comprised of cybersecurity experts who have spent decades working with science and engineering communities.

Force Majeure

Force Majeure

Force Majeure specializes in cybersecurity, incident response, and digital forensics, with experience spanning more than a decade.

OSI Security

OSI Security

OSI Security's primary services include penetration testing, security auditing, web application security testing and risk management.

Bugbank

Bugbank

Bugbank (aka Vulnerability Bank) is a leading SaaS platform for internet security services in China.

MetaWeb Ventures

MetaWeb Ventures

MetaWeb Ventures is a global venture capital firm focused on pre-seed and seed investments in crypto start-ups.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.

AHAD

AHAD

AHAD provides cybersecurity, digital transformation, and risk management services and solutions to Government, Fortune 500, And Start-Up Companies in the Middle East region.

Apollo Secure

Apollo Secure

Apollo is an automated cybersecurity platform for startups and small businesses to achieve and maintain security compliance.

Nova Microsystems

Nova Microsystems

Nova's mission is to revolutionize cybersecurity through continuous data analysis and dynamic AI-driven encryption.