96% of Companies Are Using AI to Fight AI Based Cyber Threat Emails

The use of AI in the realm of cyber attacks, particularly those that show up in emails, has been largely negative. Malicious actors tend to use AI to draft more realistic emails than might have been the case otherwise, along with attempting to send them out in far vaster quantity with all things having been considered and taken into account. In spite of the fact that this is the case, it appears that AI can also be used to defend companies from these emails.

A recent study conducted by Perception Point on behalf of Osterman Research revealed that more and more organizations are eager to use AI to protect themselves from attacks via email. With all of that having been said and now out of the way, it is important to note that 92.2% think its important to prevent outbound emails from leaking sensitive data. 91.4% stated that preventing account take overs and phishing through emails is also important.

Interestingly, 91.1% have already faced emails that were sent via AI which threatened to compromise their systems, but an even higher proportion said that they are using AI in their security protocols. 96.9% of the people that responded to this survey indicated that AI is forming the bulwark of their digital protection because of the fact that this is the sort of thing that could potentially end up improving upon traditional methods dramatically.

25% of survey respondents stated that email protection is their number 1 priority. 52% listed it as one of their top three priorities, 20.9% called it one of their top five priorities, and 0.7% said it was in their top ten. Just 1.4% said that it’s not a priority at all, and with 84.3% fully expecting AI to continue to be an issue, it is unsurprising that so many want to use AI themselves.

This can be seen as fighting fire with fire, and pretty soon non AI supported email systems will be so easy to compromise that they may no longer be tenable. As a result, AI based security might soon become the norm.

Read next: A Deep Dive Into The Unseen Networks, Undersea Cables and Surveillance
Previous Post Next Post