{"id":20421,"date":"2025-03-12T00:55:44","date_gmt":"2025-03-11T23:55:44","guid":{"rendered":"https:\/\/ig.technology\/?p=20421"},"modified":"2025-03-12T01:06:49","modified_gmt":"2025-03-12T00:06:49","slug":"companies-complacent-about-cybercrime-amid-rising-ai-driven-risks","status":"publish","type":"post","link":"https:\/\/ig.technology\/index.php\/2025\/03\/12\/companies-complacent-about-cybercrime-amid-rising-ai-driven-risks\/","title":{"rendered":"Companies Complacent About Cybercrime Amid Rising AI-Driven Risks","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"\n<p>Despite the increasing threat of cyberattacks powered by artificial intelligence (AI), many companies remain worryingly complacent about cybersecurity. The <strong>Global Cybersecurity Report 2025<\/strong> from the <strong>World Economic Forum (WEF)<\/strong> highlights that geopolitical tensions are fueling cyberattacks from state actors and criminal organizations. Critical industries such as <strong>healthcare, financial services, and energy infrastructure<\/strong> are particularly vulnerable.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Key Cybersecurity Concerns:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Supply Chain Complexity:<\/strong><br>The interconnected global network increases opacity and unpredictability in cyber risk management.<\/li>\n\n\n\n<li><strong>Poorly Managed Technological Advancements:<\/strong><br>The rapid adoption of AI without adequate security measures expands the <strong>attack surface<\/strong>, enabling more sophisticated cyber threats, including <strong>deepfake scams<\/strong>.<\/li>\n\n\n\n<li><strong>Cybersecurity Skills Gap:<\/strong><br>A shortage of skilled cybersecurity professionals hinders organizations from effectively managing risks.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Recommendations for Businesses:<\/strong><\/h3>\n\n\n\n<p>\u2705 <strong>Adopt a &#8220;Zero Trust&#8221; Approach:<\/strong><br>Restrict access to sensitive data and never trust any entity by default.<\/p>\n\n\n\n<p>\u2705 <strong>Continuously Assess Third-Party Vendors:<\/strong><br>Require regular cybersecurity audits from business partners and service providers.<\/p>\n\n\n\n<p>\u2705 <strong>Comply with Emerging Regulations:<\/strong><br>Adapt to frameworks like <strong>NIS2<\/strong> and the <strong>Digital Operational Resilience Act (DORA)<\/strong> in the EU, which mandate stronger cyber resilience and supply chain security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Cost of Cybersecurity Complacency<\/strong><\/h3>\n\n\n\n<p>Neglecting cybersecurity can be <strong>costly<\/strong>. In the past five years, cyberattacks have cost <strong>British businesses approximately \u00a344 billion<\/strong> in lost revenue, impacting <strong>52% of private sector companies<\/strong>.<br>\ud83d\udd17 <strong><a href=\"https:\/\/www.reuters.com\/technology\/cybersecurity\/cyberattacks-cost-british-businesses-55-billion-past-five-years-broker-says-2024-11-25\/?utm_source=chatgpt.com\">Source<\/a><\/strong><\/p>\n\n\n\n<p>With <strong>AI-driven cyber threats on the rise<\/strong>, organizations must recognize the <strong>urgency of proactive security measures<\/strong> to safeguard their assets and maintain customer trust.<\/p>\n\n\n\n<a href=\"https:\/\/www.reuters.com\/sustainability\/sustainable-finance-reporting\/esg-watch-companies-complacent-about-cybercrime-despite-rise-risk-ai-2025-02-03\/\">\n    <button>Read the Original Article<\/button>\n  <\/a>\n\n\n\n<p><\/p>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"<p>Despite the increasing threat of cyberattacks powered by artificial intelligence (AI), many companies remain worryingly complacent about cybersecurity. The Global Cybersecurity Report 2025 from the World Economic Forum (WEF) highlights that geopolitical tensions are fueling cyberattacks from state actors and criminal organizations. Critical industries such as healthcare, financial services, and energy infrastructure are particularly vulnerable. Key Cybersecurity Concerns: Recommendations for Businesses: \u2705 Adopt a &#8220;Zero Trust&#8221; Approach:Restrict access to sensitive data and never trust any entity by default. \u2705 Continuously Assess Third-Party Vendors:Require regular cybersecurity audits from business partners and service providers. \u2705 Comply with Emerging Regulations:Adapt to frameworks like NIS2 and the Digital Operational Resilience Act (DORA) in the EU, which mandate stronger cyber resilience and supply chain security. The Cost of Cybersecurity Complacency Neglecting cybersecurity can be costly. In the past five years, cyberattacks have cost British businesses approximately \u00a344 billion in lost revenue, impacting 52% of private sector companies.\ud83d\udd17 Source With AI-driven cyber threats on the rise, organizations must recognize the urgency of proactive security measures to safeguard their assets and maintain customer trust. Read the Original Article<\/p>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":1,"featured_media":20425,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1,19],"tags":[],"class_list":["post-20421","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyber-security"],"aioseo_notices":[],"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/posts\/20421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/comments?post=20421"}],"version-history":[{"count":2,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/posts\/20421\/revisions"}],"predecessor-version":[{"id":20423,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/posts\/20421\/revisions\/20423"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/media\/20425"}],"wp:attachment":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/media?parent=20421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/categories?post=20421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/tags?post=20421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}