AI’s Achilles’ Heel Comes Into Focus Prompt injection attacks, where attackers try to exploit vulnerabilities in how LLMs (Large Language Models) process information and generate responses, can be used for malicious intent. This is done by tapping into the difficulty LLMs have differentiating between developer-defined system instructions and user-provided input. For example, imagine a chatbot […]
Offline Storage is Imperative for Today’s Data Protection!
Offline Storage is more important now than ever! Over 59% of organizations have experienced a ransomware attack within the past year. The average cost per organization is now over 2 million dollars. These attacks have become more sophisticated, and with the addition of AI, attacks are also becoming more effective. The use of ransomware is […]
Cybersecurity and the Rapid Expansion of the AI Industry
Nvidia (an artificial intelligence chip manufacturer) has become the most valuable company in the world, surpassing Apple and Microsoft. They dominate the market in AI chips, especially those needed to train and run AI software such as ChatGPT. The acceleration of Nvidia over the past year has some experts anticipating that this is just the […]
Guest Post: Last Mile Communications: Ownership and Security with Lochbox
Last Mile Communications: Ownership and Security with Lochbox INTRODUCTION In 2017, the US Department of Homeland Security issued a security report (DHS, 2017, p. 53) strongly discouraging the use of provably-open mobile calls and SMS text messages while declaring the use of landlines as no more secure. Convenience and complacency are the two main factors […]
Guest Post: Take The Power Back From Hackers
How To Keep Control Of Your Data, And Avoid Becoming A Cybercrime Victim by Earl Foote – CEO/Founder | Nexus IT Consultants 2020 was a banner year for cybercriminals. The number of phishing emails and social engineering scams that use the COVID-19 pandemic as a topic represents the single largest thematic series of cybercrime attacks […]