In this second article for Cyber Security month, we’re going to focus on one of the hottest tools to gain traction in this century— Artificial Intelligence (AI). With the advent of AI as we know it today, it’s even more critical, as we noted in our previous article, that we maintain a consistentCYBER Securityposture of:CheckingYourBehaviorElevatesResilientSecurity.
Just as we find AI tools like ChatGPT, DALL-E, Google Gemini, and Apple Intelligence useful, so do cyber criminals. They use these tools to make their emails, texts, voice calls, and video calls more realistic.
Sign up for our free newsletter.
If you’re wondering how AI is helpful to cyber criminals, just think for a moment. AI systems train on data we routinely make public via our social media posts, company websites, press releases, and other public records. Just as we can, they also can, with a few prompts, assemble a complete dossier of where you work, who you report to, what you just posted, and even how you write. These generative tools can then produce messages that mirror your tone, mimic a colleague’s style, or reference a meeting on your calendar, making what’s fake feel familiar.
@media ( min-width: 300px ){.newspack_global_ad.scaip-1{min-height: 100px;}}@media ( min-width: 728px ){.newspack_global_ad.scaip-1{min-height: 90px;}}Even when you use detection tools like virus checkers, multichannel phishing detectors, or other security products, the best everyday defense, in my opinion, ultimately boils down to personal habits. Here is where theCYBER Securityacronym can be helpful. If you pause and check your behavior before you click, reply, or pay, you build your own resilience — and that of your family or workplace — against these AI-sharpened scams.
So how do you fight back if attackers can sound like your boss or write like your spouse? Go back toCheckingYourBehaviorElevatesResilientSecurity:
Checking:Slow down!Phishing works by rushing you. Re-read the message. Hover over links (or long-press on mobile devices) to preview real destinations. If a message asks for credentials, payment, or sensitive files,checkit via a separate channel you already trust (e.g., call the person using a number you know) to verify its authenticity.
@media ( min-width: 300px ){.newspack_global_ad.scaip-2{min-height: 100px;}}@media ( min-width: 728px ){.newspack_global_ad.scaip-2{min-height: 90px;}}Your Behavior: Small routine changes beat complex tools. If you haven’t already, turn on multi-factor authentication (MFA) wherever possible, use strong, unique passwords (a manager can help), and keep your software up to date. If you are on a company device, report suspicious messages (don’t delete) and move on. Organizations that mandate reporting can spot campaigns earlier and protect more people.
Elevates— Every good choice compounds. When you verify a wire request, refuse to share a code over the phone, or escalate to the appropriate people, an odd “VPN update” email, you raise the security bar for everyone in your circle.
Resilient— Assume some attempts will still get through. Resilience means creating backups for important files, setting alerts on bank and credit accounts, and establishing a clear plan of who you tell, what you change, and how you recover.
@media ( min-width: 300px ){.newspack_global_ad.scaip-3{min-height: 100px;}}@media ( min-width: 728px ){.newspack_global_ad.scaip-3{min-height: 90px;}}Security— Make it part of both home and work culture, not just a checkbox. Talk about scams with family and coworkers. Run short, realistic practice drills with your family members, especially children. Treat unexpected, urgent communication with skepticism, especially regarding money, credentials, or personal data. If a “CEO,” “HR person,” or “law enforcement representative” contacts you demanding quick action, DON’T! That’s when to slow down the most.
Finally, know the telltales of AI-assisted phishing—even when spelling is perfect:
If something feels off, it probably is. Verify through your own contact list, typed URLs, or official portals you navigate to yourself—not links you were sent. And if you do get phished, report it quickly. The faster you act, the more damage you prevent.
@media ( min-width: 300px ){.newspack_global_ad.scaip-4{min-height: 100px;}}@media ( min-width: 728px ){.newspack_global_ad.scaip-4{min-height: 90px;}}Bottom line:AI helps criminals scale their persuasive attacks, but if you remember and follow:Checking Your Behavior,Elevates Resilient Security,you and everyone around you will be safer.
Karen ClayClick Here to See More posts by this AuthorBio ⮌document.addEventListener('DOMContentLoaded',function(){document.addEventListener('click',function(event){const target=event.target.closest('.m-a-box-data-toggle');if(target){event.preventDefault();let authorBox=target.closest('.m-a-box');if(authorBox.getAttribute('data-multiauthor')){authorBox=target.closest('[data-author-ref]')}if(authorBox){const postLabel=target.querySelector('.m-a-box-string-more-posts');const bioLabel=target.querySelector('.m-a-box-string-bio');if(postLabel.style.display==="none"){postLabel.style.display="inline";bioLabel.style.display="none"}else{postLabel.style.display="none";bioLabel.style.display="inline"}const bio=authorBox.querySelector('.m-a-box-bio');const related=authorBox.querySelector('.m-a-box-related-entries');if(related.style.display==="none"){related.style.display="block";bio.style.display="none"}else{related.style.display="none";bio.style.display="block"}}}})});Karen Clay#molongui-disabled-linkCYBER Security Month: Watch Out for Phantom HackersKaren Clay#molongui-disabled-linkLarge Language Models: The Engine Behind Artificial Intelligence (AI)Karen Clay#molongui-disabled-linkExtortionware: ‘Sam’s’ StoryKaren Clay#molongui-disabled-linkAre Passwords Passé? The Growing Trend Toward the Use of Passkeys


