Author name: admin

Illustration of a Williams Racing Formula 1 car overlaid with Keeper Security's logo, symbolising enterprise cybersecurity in high-speed environments
Blog

F1-Level Cybersecurity: Our Partnership with Keeper

When Cybersecurity and Motorsport Combine This past weekend’s Formula 1 race showcased not only raw driver talent but the strategic excellence of engineering teams. Oscar Piastri and Lando Norris clinched first and second for McLaren, while Alex Albon’s impressive 5th place finish for Williams Racing drew attention beyond the track. Behind that performance is a relentless focus on data integrity, secure communication, and controlled system access – enabled by Keeper Security. In motorsport, milliseconds and megabytes are equally important. A single breach in data confidentiality or a delay in system access can mean the difference between podium and the pit lane. That’s why Keeper Security’s partnership with Williams Racing isn’t just symbolic – it’s operationally essential. Why Keeper Security Powers F1-Level Protection Keeper Security delivers zero-trust, zero-knowledge architecture, offering enterprise-grade protection for credentials, secrets, and infrastructure access. For Williams Racing, this translates to: Protection of proprietary strategy models and telemetry data Secure credential access across international engineering teams Defence against phishing, ransomware, and credential compromise With solutions like KeeperPAM®, Secrets Manager, and real-time threat intelligence, Keeper ensures uninterrupted, secure collaboration from garage to grid. Keeper’s technology goes beyond passwords. It includes: Privileged Session Management for auditing sensitive actions Secure File Sharing across global operations Passwordless and SSO integrations that streamline access while preserving control Just as pit crews operate with precision and clarity, Keeper equips cybersecurity teams with the visibility and governance to act with speed and certainty. What Businesses Can Learn from the Track Formula 1 is a masterclass in systems integration and situational awareness. Every subsystem – brakes, aerodynamics, engine performance – feeds into real-time strategic decisions. Likewise, businesses rely on efficient yet secure system access. Keeper enables: Secrets Management for DevOps to secure credentials in CI/CD environments SSH Key and Remote Database Access without exposing credentials Automated Password Rotation for critical infrastructure Whether you’re running retail operations, financial systems, or cloud-native deployments – your architecture deserves the same discipline and protection. Trusted Globally – And Locally As Williams Racing’s cybersecurity partner, Keeper is trusted at the highest level of competitive performance. But the same tools that power elite motorsport teams are available for businesses across the UK. Keeper helps you: Prevent breaches caused by compromised credentials Maintain compliance with standards like GDPR, ISO 27001, and Cyber Essentials Gain full control over infrastructure access without sacrificing speed In fact, 81% of UK businesses experienced cyber incidents in the past 12 months – many from common vectors like email compromise and poor credential hygiene. Want F1-Level Cyber Control in Your Organisation? From passwordless authentication to privileged access auditing, Keeper Security delivers the same technologies trusted in Formula 1 to protect your business. Whether you’re managing five users or five thousand, your access control deserves the same precision as a race-winning pit stop.

GiftAid
Blog

Gift Aid

Gift Aid Simply put, Gift Aid is a form of tax relief.  This allows charities to receive up to 25% more income from a donation made by a UK taxpayer. Once a donation has been made, a charity is able to claim back the basic rate of tax from it from the government CAF Cirrus has developed a paperless Gift Aid system, that also has Point of Sale (POS) stock control and can link into accounting systems specifically for charities.  Your all-in-one system for charity led retail is now available.  To help here are a few essential Q&A’s Q:  Can we just use the Gift Aid standalone, without the POS? – YES.  The system is modular so we can turn this on or off as needed Q: Does the system allow multiple items as part of a single gift (Perhaps a bag of clothes or box of books)? – YES.  Each item can be individually tracked, priced and sold Q:  Does the system capture details and report on them in-line with HMRC guidelines? – YES.  We have back office reporting that tracks each person who gifts and each item they have gifted, been sold or held in stock Q: Can the system remember people who gift on a regular basis and save their information for speedy drop-off? – YES.  Our system securely records the contact details and can issue a membership style system.  These frequent drops off are also recorded for HMRC requirements Q: Can we set prices and calculate profit? – YES.  Our production valuation screen lets you set this per item and print the necessary labels POS Our cloud based POS system is perfect for retail, bars & restaurants, builders merchants, Garden Centres, Visitor Attractions and more. The system integrates with a number of handheld payment terminals and accounting systems for real end to end record keeping too. At Cirrus we strive to be your technology partner of choice.  In the case of Gift Aid we listened to our clients, developed a system and put it into use in their locations, saving them not only in tax but also the efficiencies the business realized in the process. Get in Touch If you are in need of a partner to manage your IT, drive change &  improve operations perhaps you should #ThinkCirrus. For Consulting, Design, Delivery and Managed Service…. #ThinkCirrus Call us on 033013 130966 or book an appointment here : Time to #ThinkCirrus   #Giftaid #Manageditservices #POS #ukwide

Wi-Fi 7 from Cirrus
Blog

Wi-Fi 7

What is Wi-Fi 7 and do you need it in your business? A bit like your smartphone or Microsoft Windows getting a version upgrade it’s time for Wi-Fi to take another leap forward with Wi-Fi 7.  Delivering more capacity, more flexibility & reliability to your Wi-Fi Network Wi-Fi 7 is literally like a gadget from StarTrek The Technical Stuff Wi-Fi 7 has 2 big differences (OK there are many but these the two big items), the first is the introduction to 320 MHz channels which is double what’s currently possible with Wi-Fi 6.  Double the capacity means more simultaneous connection and faster speeds.  The other key aspect is Multi-link functionality meaning any device can connect using 2.4, 5 and 6 GHz channels   simultaneously.  Connections will be smoother and more reliable.  There’s a useful link here from the WiFi Alliance If you would like to read more 4x higher data rates (The theoretical throughput of approximately 46 Gbps) Increased speed, reduced latency, and greater reliability with multi-link operation (MLO) Enhanced spectral efficiency and interference mitigation with multiple resource units (MRUs) Efficient use of channel and bandwidth via preamble puncturing Lets talk Business Wi-Fi is a bit like breathing air, we want it, we need it and we just expect it to be there always.  Wi-Fi 7 can be your air, always there and as much as you want.  If your office has been hesitant in adopting  Wi-Fi this could be the key you need to unlock the potential and flexibility you need.  As a business you need to ability and flexibility to add ever increasing wireless devices without limits.  In addition to the speed benefits and the concurrent connections the new standard also offers lower latency which is significant for gaming, virtual & augmented reality plus 8K video. If you operate a stadium Wi-Fi 7 should be your go to selection for the ultimate guest experience.  Shopping centres  are also ideal  deployments, the volume of connections makes the technology for the footfall you are likely seeing.  Further if you a re looking to provide shoppers with a more immersive experience 7  provides the capacity you need. In education the capacity for new learning mediums  and healthcare better patient experience lend themselves to Wi-Fi 7 and the greater capacity Wi-Fi 7 was approved for use in the UK this year (2024) so in terms of future proofing your business you truly are stepping into new territory and ensuring your technology will scale with you.  If you are looking for a large scale deployment we have the tools to plan and design your ideal environment.  A thorough design, with both AP placement and selection across your site are necessary to ensure correct coverage and the required level of service     About Us Cirrus are a leading UK provider of Managed Services and been supplying enterprise Wireless for high capacity/ large footfall locations for over 10 years.  If you are looking for a true partner capable of managing your entire estate you should #ThinkCirrus https://thinkcirrus.co.uk T: 03303 130966

Louis Restaurant Manchester
Blog

Your IT Partner

We’re back in the press today with an advert we’ve run with the Business Post.  It’s all about being your IT partner. The Article   A Technology Partner for Your Business? Our business is to look after your business, specifically the technology you use or perhaps need.  A partner capable of designing, installing and managing your various services from internet connections to CCTV, phones, POS or security.  Let’s face it your IT is ever growing, becoming more complex and you need to trust it’s in safe hands.  You don’t have time for checking backups, performing maintenance or ensuring the necessary compliance is taken care of. Would it be beneficial to have a single point of contact you can go to? Would it be favourable to get advice when needed and trade issues for solutions? Would a single partner who can deliver projects and manage the day-to-day operations add value? If You Are Thinking About a New Technology Partner? ThinkCirrus Your partner for BAU We operate our UK based service desk 7 days a week to handle all your issues.  Everything from a P1 site issue to paper jam our team can assist you through a solution.  As needed one of our 60 field team members can visit your site and rectify more complex challenges.  We carry temporary stock so if a band-aid is needed to keep you going we’ve got you covered Your partner for PROJECTS Our project team can fully oversee new openings, refurbs or smaller deployment projects.  This includes any third-party suppliers such as Zonal, QSR or your preferred supplier.  We have existing relationships with many of these companies and are fully able to deliver projects before handing over to BAU Want someone to look after the mundane?  ThinkCirrus Looking for strategic advice? ThinkCirrus Need help with expansion? ThinkCirrus Keen to ensure your technology is keeping pace with the business? ThinkCirrus Internet Connectivity Back Office Systems POS & Kitchen Automation Phones and Reservations Systems CCTV & Security Audio & Presentation Screens Full Project Management of Technology   If this resonates with you would why not visit our website Cirrus Technology Solutions or call 03303 130966, we’d love to talk with you The full magazine article can be found here : Business Post If you are interested in the location it’s a Louis Restaurant Manchester https://louisrestaurants.com/    

Cirrus and vipre
Blog

Cirrus and ViPRE

Cirrus and Vipre October is Cyber Security Month.  So during October we’ll be running a a series of event focused on the topic and how you can build a strategy for on-line security.  This will include steps you can take to protect your business.  This first event is hosted with Vipre a global partner who specialise in mail security through it’s machine learning technology and real time protection. Vipre provides a number of unique solutions including Sandbox featured included in it’s threat explorer module.  Vipre’s mail scanning and mail filtering works 24/7 to stop threat loaded e-mail reaching your business Our Webinar will include a demo of the service and how it works and what users see.  Users can control and refine what’s blocked or allowed for delivery.  For those items you are not sure about Sandbox allows you to safely explore the e-mail content before making a decision Protection for Incoming and Sending of E-Mail All E-mail can be scanned both as it is sent and received.  So not only can you be sure knowing the e-mail you receive is safe but also the people receiving your messages get the same benefit. Vipre can work with on-premise mail, Office365 and GoogleWorkspace plus others so regardless of your mail provider we get you covered Booking For more information we have a dedicated page Vipre all of which will be covered during the event which you can book here Vipre on-line event The event is taking place on Tuesday 1st October at 1pm.    

Managing Technology Projects
Blog

Managing Technology Projects

Managing Technology Projects Last week we wrote about why you might want a Technology Partner.  This week we’re off to Gloucester for our latest restaurant opening managed from start to finish.  The project is a good example of how we at Cirrus runs our client projects and why it’s important for you.   So lets provide you a flour of what to expect.  Its All Part Of A Plan Whilst we’re very much a technology company our involvement begins in the early stages of planning, often part of the design process.  As a client we have a model we delivery against for each venue.  What we mean by this is we provide a number of services, such as Wi-Fi.  The list is services we provide in total includes Internet connectivity, Networking, Firewalls, Point of Sale, Music, TV’s, Voucher systems and so on.  But in order to provide the service we need to understand layout, preferences, building materials etc.  Once we have this we can design the WiFi (or any other service) for the clients exacting needs.  The model of equipment, how many, mounting positions etc are all agreed as part of an iterative process that only works if we all contribute actively to the process. At the start of each new opening we ask questions about where services are needed.  In the case of Hickory’s Smokehouse WiFi is needed almost everywhere.  The restaurant, obviously but also the kitchens, offices, the team area and outside for the extensive seating.  We work through the correct product specifications and locations and have them all confirmed with the wider project team.  The same is true for tills, time entry systems, printers, payment terminals and so on.  Importantly there are significant back office operations to ensure we correctly cater for. It’s very much a joined up activity that takes several weeks to complete.  Managing Technology Projects is very much about phases of work, all linked to a completion date.       Build & Test Having completed the journey of checking requirements and scope we move to build and test.  All of the equipment is procured and delivered to our office and setup in our build area.   This process often includes third party equipment being delivered to us.  We replicate every part of the network and attach the equipment precisely the same as it will be in the final location on premise.  Tills are connected to switch ports, back office functions are tested, fobs validated and accounts created.  Every device that’s part of the scope is connected, configured and documented. It’s all about quality and the end result. Our philosophy is that when we get to site, the install should be as painless and straightforward as possible.  It should have only the minimum  additional configuration outstanding with everything tested.  It makes sense that if we’re going to have any issues it’s better they occur in our offices where we can mange them.  When done all equipment is labelled and packed ready for transport.  All of the builds are checked and a full inventory validated for loading. With some of our larger partners, they come to our offices too. POS terminals (For this client Zonal POS).  The engineers from zonal visit our offices to setup and configure the systems, knowing they are working against a live system and one that will not change.  Again the goal here is to ensure fast and accurate installation. As I’ve said, this is all about quality. On-Site Managing Technology Projects, like any project is all about managing risks and dependencies as well as actually getting the job done.  So project management is very much part of getting the job done.  Our projects team will have checked dependent activities are all compete and the environment is ready for us many times as part of the preparation. When we arrive on site our team have a pre-created checklist to work through, are fixtures and fittings actually where they should be,  Is any work taking place that we need to accommodate? are the basics like power all available.  The project team will have validated these questions multiple times ahead of us arriving on-site but it’s standard practice to do it when we arrive. For the most part it’s about unbox, connect & test.   Project Closure Our final day on site includes formal handover.  Our clients decide if they are happy and prepared to accept handover.  Additionally we have a post project review about 7-10 days later where we meet again and look for improvements and learning we can take to the next project.  There is always something to learn. The important thing is we deliver to the programmed deadline.  In this example it’s a restaurant opening and after we’ve handed over training starts.  The opening plan also includes soft openings ahead of a set launch date two weeks later.  If the technology is late or does not work as intended it has the potential to have an knock on effect for our client.  Reputations are hard earned and we have to be as passionate about our service as our client is with theirs. Ensuring we have a quality process ensures the outcome is of the highest quality too.  Why would you not want that? We wrote this as a way to demonstrate some of what we go through when delivering technology projects.  Each is different.  Each client has their own way.  We can accommodate styles but we always bring our experience and passion to your project Contact us Consult, Design, Deploy & Manage.  Way more than IT Support.  A true partner. Project Management for your Technology Install? ThinkCirrus Looking for strategic advice? ThinkCirrus Need help with expansion? ThinkCirrus Keen to ensure your technology is keeping pace with the business? ThinkCirrus If this resonates and you would like to know more you can arrange an intro meeting here On-line Meeting with Cirrus if you’d prefer face to face drop us an e-mail to hello@thinkcirrus.co.uk or call 03303 130966, we’d be more than happy meet

National Cyber Security Centre
Blog

Cyber Essentials

Cyber Essentials We’ve written plenty of content over the years about the importance of Cyber Security and the ways in which you can secure your on-line presence.  Now a report from the National Cyber Security Centre https://www.ncsc.gov.uk/ backs this up with data from leading insurers.  The recently published article an article that concludes; Cyber Essentials as an effective driver of resilience: Companies with hashtag#CyberEssentials controls in place made 92% fewer claims than those without. The fact that companies who have taken the step to certify is a testament to its effectiveness.  92% speaks for itself.  If you’re looking to safeguard your organization, CE and CE+ is a great way to secure your digital footprint The full government overview can be found here: NCSC We also have a page dedicated to this on our main site here Fundamentals of Security from Cirrus where we talk about our fundamentals of security.  Here we open up about the many layers you can adopt to protect your business   Talk to us about Security As a specialist technology partner Cirrus are able to help with many levels of on-line protection.  Cyber Essentials & Cyber Essentials plus are fantastic foundations.  We are also able to offer PCI compliance ISO27001 and Penetration tests as part of our range of services.  We are also an official Fortinet Partner. For more information call us on 03303 130966 or get in touch using hello@thinkcirrus.co.uk    

Blog

Why partner with an MSP who values customer feedback?

Why partner with an MSP who values customer feedback? Customer feedback is an often under-rated and underutilised metric. When your services are failing, and your customer communication network is glitching that niggling need for support begins. As your business frustration is mounting you know you need a managed service provider who understands your needs. Knowing if they can meet those needs, that’s a different question. One you might find the answer to in their customer feedback scores. Customer service expectations come from experiences encountered as both a consumer and a business owner. They form the baseline of what you consider good customer service. When partnering with a managed service provider, you need to be sure that they can deliver good customer service, especially in a crisis. If you operate a customer service-based business with a reputation for excellence, you want to partner with an MSP offering the same standard of service. Imagine your frustration if you found your MSP offered lacklustre and sub-par customer service? With slow response times and issues rumbling on, unfixed, affecting your business. That’s why you need to partner with an MSP who values customer feedback. Customer feedback Customer feedback is at the backbone of your business. Understanding your consumer’s behaviour is crucial to ensuring your products and services meet customer needs to create business growth. For MSPs this is no different. Measuring feedback from your customers is something that most businesses do and there are many different ways to obtain and measure feedback. It is a crucial metric to measure. Salesforce research shows that 88% of customers say customer experience is as important as the product or service being sold. For most businesses, customer satisfaction is often measured using survey-based measures following customer interactions. A CSAT (customer service) score is generated from a survey response and businesses are provided with metrics to let them know how the interaction went from the customer’s perspective. Over 200 MSPs in the UK use Smileback to accumulate this data. Smileback An industry specific tool MSPs use to gain customer feedback, Smileback provides accurate and detailed dynamic data which can be tracked across numerous timescales.  Microsoft defines Smileback as “the only feedback system specifically designed for MSPs and focused exclusively on customer satisfaction.” For the service desk in an MSP, who provide frontline responses to customer queries, this tool is a game changer. After each interaction a survey is sent out and feedback is gathered from the customer using a one-click method. Simply choose the emoticon that best fits your experience. The option to leave a comment is also available and this information is the sent back to the MSP. By providing real-time accurate responses MSPs who choose to implement this kind of service have data that can be used to develop tailored customer service which is dynamic to meet changing needs. More significantly though, it helps customers to raise issues with customer service and hopefully get timely feedback. If an MSP is using this data one poor service desk experience will most likely only be a one off, as the MSP should use your feedback to improve their service. Customer feedback data that goes further Smileback data is not only about one interaction; it charts all of your interactions across an entire service desk team. Statistics are available to show how well your team is performing across any time period you choose, so achievement is measurable. Building on that it also shows you how well your MSP compares to other MSPs using the service. This is a great performance indicator which acts as customer service motivation. A top 10% across the sector is generated from real-time data which gives MSPs a live and comparable standard of excellence to strive for. Smileback data allows MSPs to see how their service is being received by their consumers. This data should not simply be used for the purposes of showing. Quality MSPs will take this data and use it to learn from, creating actionable customer service-based goals. The best MSPs will take their data orientated goals and turn it into actionable outcomes, demonstrating that they are continually striving for the best possible customer interactions. Actionable outcomes Data alone is nice for a company to have. Many companies will publish their data not really understanding what they are publishing. Picking and choosing stats to shout about, you might notice that statements from these companies are followed by empty words with no actions. When you are looking for an MSP, this isn’t what you want. Look for an MSP who understands their feedback statistics and builds on them. An MSP who sees lessons in their data and uses it, is the MSP you want to partner with.  Building their team up with new skills and rewarding them for their customer service success shows the value an MSP places in delivering the best possible customer service experiences. Smileback data This is a bespoke infographic provided by Smileback to show the industry standards an MSP should be hitting for CSAT and NPS (Net Promoter Score) according to July’s data. CSAT data analysis The average MSP will have a Smileback score of 96.9 or above. As a consumer you can ask your MSP if they evaluate their feedback. You can also ask for their results as part of a report before you sign with them. An MSP with a score of 96.9 or higher is an MSP who values customer feedback. If your MSP is in the top 10% of MSPs for customer service their CSAT score will be 100. Spotlight on Cirrus Cirrus use Smileback to provide CSAT (customer satisfaction) data. This data is just one of the metrics the service desk, and whole team, have constant access to. At the heart of the operation is a bespoke system, built in-house, to display accurate client metrics. In the top right-hand corner of this system is the CSAT score, which is calculated using Smileback. Smileback is tracked over a 90-day period and the score fluctuates each

Blog

Setting-up MFA: a Microsoft Azure legacy this summer

Setting-up MFA: a Microsoft Azure legacy this summer. It’s the summer to set-up MFA. With Microsoft beginning rolling out its new MFA policy in July, it’s a topic that’s as hot as a heatwave across the technology landscape. Microsoft is blazing a path towards stronger security for all accounts, but two questions remain. Do users understand why MFA will provide cyber security solutions for them? Do they know how to set-up MFA? Microsoft Azure Microsoft Azure is a cloud computing platform that effectively gives its users access to a huge pool of computing resources that Microsoft provides. This means you can use the resources you need without having to purchase physical hardware. It provides a business resource which is affordable and scalable no matter your business size. You can add resources or remove them as required. It is a comprehensive business tool which has the potential to store large amounts of your business information and your clients’ information. Why is MFA being enforced by Microsoft? Updating defences and maintaining good cyber security is part of being a responsible service provider. Microsoft have conducted research into the need for this extra layer of cyber security in their own report titled, How effective is multi-factor authentication at deterring cyberattacks? The report found three key findings in its research: 17% of accounts that were “compromised” by cyber-attacks did not have MFA. Implementing MFA leads to a 99.22% reduction of cyberattack. In case where private information has already been leaked, the use of MFA leads to a 98.56% reduction in further compromise. Microsoft’s research highlighted some eye-opening results which have, in part, translated into the roll out of mandatory MFA for Azure users. The impact of MFA on account security was not only being researched by Microsoft. Independent MFA findings Other reports have been released using data gathered from different tests and the results present similar findings: Google actively participated in the Biden Administration’s Symposium focused on strengthening authentication for online security. At this Symposium Google describe MFA as “one of the most effective ways to reduce the risk of significant cyber incidents”. It has been independently ascertained that up to 80-90% of cyber-attacks can be prevented using MFA. Google released data in 2019 showing that by adding a second level of authentication to accounts you can: Block up to 100% of automated bots Block 99% of bulk phishing attacks Prevent 66% of targeted attacks. Microsoft’s research is not stand alone. The implementation of multiple levels of authentication is proven time and again to strengthen account security. This is leading to changes in how we are asked to secure and authenticate our online accounts as businesses and individuals. Government policy In the UK, the government brought in legislation on 29 April 2024 which mandated businesses to meet a password standard for smart devices connecting to the internet. This law demonstrates the need for stronger account security in a world where we use internet-based devices multiple times in our daily lives. The law was a world-first, an innovative and disruptive policy designed to bring change and security. Microsoft are doing the same and they have a well-publicised initiative which covers this ideology. Microsoft Secure Future Initiative In November 2023, Microsoft launched the Microsoft Secure Future Initiative in response to the increasing threat of cyber-attacks. Aiming to strengthen accounts in the face of increasing cyber threats the initiative covers both company practice and products. There policy is built on three pillars or ‘principles’: Secure by design: designing products with security at the forefront of the design process. Secure by default: Security is both enabled and enforced with no exception, no extra effort and no option. Secure operations: Through monitoring and security controls the dynamic nature of cyber threats will be met. Microsoft seek to develop and continuously improve security to benefit their company and their consumers. The decision to roll-out mandatory MFA this summer directly links to the initiative and to the principle of ‘secure by default’. The announcement On 14 May 2024, Microsoft posted this statement on their blog as the formal announcement to customers that MFA would become a mandatory part of account authentication. As you can see from the screenshot of the news direct from Erin at Microsoft, the rollout begins in July, which shows it will be a process. There are those who have criticised this move saying that users do not have enough time to respond; that change is being sprung on them. Mandatory MFA is a necessary change to protect users from the increasing threat of having their accounts hacked. This change could save business owners thousands of pounds, save countless hours of time in the event of a breach, and save their business’ reputation. This impact is being overlooked but why? Time and capital The assumption is made that this roll-out will require large amounts of time and capital given the value it brings to account security. The value of time when running a business is high. The allocation of capital for services is often planned for months in advance to prevent unexpected expenditure. It is therefore an unrealistic expectation to achieve Microsoft’s mandatory change in less than 6 weeks in the eyes of most businesses. Unless of course this assumption is false and the roll out is not time intensive or expensive. MFA is free and easy to do This security feature will add value to your business both internally and externally and best of all it is free to do so there is no capital expenditure involved. It is easy to do, and MFA can be set-up in less time than it will take to drink a cup of coffee. By following a few simple steps, you can protect your account. How to set-up MFA? MFA is an easy and free layer of security that you can set-up on your accounts. MFA set-up is usually a simple process as the MFA set up for Microsoft Azure will show. MFA set-up for Microsoft Azure This simple process

Man thinking at desk
Blog

The disruptive power of AI in cyber security

The disruptive power of AI in cyber security. Is it a friend or foe? Artificial Intelligence (AI) is disrupting the cyber security landscape. Providing advances for cyber defence, but also providing advances for cyber-attackers. AI is walking a fine line between being a friend or a foe for business cyber security. What is AI? AI is the acronym for Artificial Intelligence. AI is the simulation of intelligence that you would associate uniquely as a human capability, recreated within technology. IBM define it as “technology that enables computers and machines to simulate human intelligence and problem-solving capabilities.” No matter what your opinion is on this technological advancement, it is a tool which is being used and will continue to be used. It is changing the business landscape in many ways. Top AI benefit to businesses, according to Bing If you ask Bing what the main use of AI is in business today it will tell you that it is for improving customer service. Chatbots are the obvious way in which AI is being used to improve customer service. It is a form of AI you are most likely familiar with and will encounter regularly when reaching out to companies or browsing the web. Whether you view this advancement and interaction positively or negatively as a consumer is a topic for another time. For businesses, Chatbots provide advantages in efficiency, cost and analytics. In the cyber security landscape AI is being used because it brings similar benefits. Benefits to cyber security Forging defence systems which are more robust and responsive at the sign of attack is at the forefront of many current developments in cyber security. Traditionally cyber-security responses to hackers have been more responsive due to the scope of data being surveyed and the capacity of professionals trained in the field of cyber security. With the advent of AI and the huge leaps forward it has taken in the last few years, the technology is now at a point where the intelligence can be used to interpret data and algorithms on a greater scale than the current human workforce. Cyber security has two significant challenges which AI technology is providing solutions for: A skills shortage in cyber security professionals exists in the UK with 50% of businesses reporting a cyber security skills gap. A further 33% businesses also have an advanced cyber security skills gap. The scope of data which needs to be scanned and is spread out across an infrastructure which was not designed with cyber criminals in mind. The task is therefore enormous. Provides capability The amounts of data created from the use of complex infrastructure results in vast data piles which needs to be scanned for threats to prevent criminal incursions. Traversing the maze of infrastructure is leaving blind spots which are being exploited. In the past, defence can be described as reactive to an attack. It’s like being one step behind. AI provides the capability to be proactive. It provides the capability to spot unusual activity by a user once it is trained in what to look for. Cyber security defences need to respond quickly and not reactively to be more effective. Makes defence more effective AI brings the following capabilities to defence systems: Speed Precision An ability to sift through more data than a human can Continuous scanning It can learn what patterns to look for in data and spot unusual data patterns. Speed and precision are key to being effective in defending against cyber-crime and AI provides that capability for defence systems. The unending ability of the machine once it has learned to detect unusual data patterns means that defences are actively checking for breaches constantly. Detects Patterns Being able to highlight the unusual data patterns and then flag them, allows the humans assessing data to be more effective in their roles too. They are checking data which is identified as being unusual which means that hackers on a system are more likely to be identified earlier. This will prevent more attacks from escalating and impacting business operations. It must be said that things will still slip through, but the use of AI in this field has a positive wider reaching impact. Businesses will have more robust security systems and fewer holes which can be exploited. The use of AI is not however all positive for businesses. AI has not only changed the defence landscape; it has also changed the attack landscape. Changes to the attack landscape AI has armed cyber criminals with a whole new arsenal of tools which are more efficient, more believable, and readily created and replicated. So while defences have strengthened, attacks have improved. The main reason for this is the exploitation of generative AI by cyber criminals, a tool which many businesses are also taking advantage of. What is Generative AI? Generative AI is when artificial intelligence is used to create content. The artificial intelligence follows parameters provided by a user to create content. Content can be pictures, words, music, songs. Generative AI is creating media in personal and professional life, but it is not only being used for lawful purposes. Cyber criminals are utilising this tool, and it is the success and scope of their cyber-attacks that is creating the challenge to cyber security. Challenges to cyber security Cyber-attacks are increasing. In 2024, it is currently expected that the cost of cyber-attacks will reach a total of $9.5 trillion globally. This is a cost which is only expected to rise as attacks become more sophisticated and convincing. Generative AI is arguably the tool which is going to give cyber-criminals that extra convincing edge. The 2024 cyber security breaches survey conducted by the government shows that 50% of businesses have experienced a cyber-attack in the last year. Of that 50% of businesses attacked, a huge 84% of breaches were done using phishing. Phishing Phishing is a type of email cyber-attack which appeals to human emotions. Phishing attacks use deception, combined with an emotive appeal to human emotion to hook

Speak to an Expert
Book a Meeting ×
Scroll to Top