Discover artificial intelligence impact on cybersecurity, password protection, and data safety strategies in our latest blog post.
The Age of AI: How to Future-Proof Your Career
AI is reshaping IT careers, emphasizing people skills over technical ones. Adaptability and creativity key for future-proofing.
The Rising Value of IPv4 Addresses
Organizations holding even a small pool of IPv4 addresses could turn this asset into cash because of changes at Amazon and other cloud providers.
What a Glorious Day
Today is a glorious day. It is National Pizza day ! and 62 degrees in February in Michigan !!!
HP Greedflation
HP greedflation subscription printing means that you could pay HP 2.5 times the purchase price for the rights to use your printer.
Artificial Intelligence – Impact on Passwords
Artificial intelligence (AI) is revolutionizing our lives. Brookings, says it is transforming every walk of life, including cybersecurity. In this blog post, we will explore how emerging AI technologies affect password protection. We also discuss strategies to enhance the security of our personal and professional data.
AI adds additional complexity to the security landscape. ISC2 found that 75% of cybersecurity professionals reported that artificial intelligence is already being used to launch cyberattacks and other malicious criminal acts. The threats include advanced password-cracking techniques like brute-force attacks and social engineering. Furthermore, AI-generated phishing attacks can deceive users into revealing sensitive information. Here are some strategies to bolster your defense mechanisms and protect your digital assets.
Enhanced Security Measures for Passwords
Let’s take a pragmatic look at some advanced security protocols:
Adapting CAPTCHA
CAPTCHA was originally designed in 2000 at Carnegie Mellon, to distinguish humans from bots. It is evolving to stay effective amidst developing threats. The efficacy of traditional puzzles is diminishing as bots become more sophisticated. Google has revised the original CAPTCHA to reCAPTCHA.
Traditional CAPTCHAs face vulnerabilities including accessibility issues, automation bypass, user frustration, and limited effectiveness. Google’s reCAPTCHA addresses these by employing advanced risk analysis, adaptive challenges, and improved accessibility features. It also supports integration with Google services, enhancing security against automated attacks while ensuring a smoother user experience.
Multi-Factor Authentication (MFA) Adoption
You can fight artificial intelligence based attacks by implementing MFA and 2FA. These mechanisms offer an additional layer of protection beyond passwords. They require users to provide multiple forms of authentication such as biometrics or security tokens. This extra layer of verification significantly reduces the risk of unauthorized access, even if one factor is compromised. While effective, the implementation of MFA requires careful consideration of usability and security trade-offs.
Single Sign-On (SSO) Solutions
Another way to fight artificial intelligence is to implement a single sign-on (SSO) user authentication solution. SSO’s enable seamless access to multiple applications using a single set of credentials. While convenient, SSO implementations must be carefully configured to balance ease of use with security considerations. SSOs require careful configuration and monitoring. Single sign-on solutions pose risks like a single point of failure. If an SSO is compromised, access to multiple systems is jeopardized
Passwordless Authentication to fight Artificial Intelligence hacks
Here are some alternative authentication methods:
One-Time Passwords (OTP)
A one-time password (OTP) can be a defense against artificial intelligence based attacks. OTP is an automatically generated string of characters that authenticates a user for a single transaction or login session. OTPs offer temporary authentication codes delivered via email, text, or authenticator apps. While effective, the reliance on external communication channels introduces potential vulnerabilities.
Magic Links
Sites set up with magic links are another way to fight artificial intelligence threats. Magic links ask users for an email address, not a password. Then the application generates a link with an embedded token and sends it via email. The user then opens the email, clicks the link, and is granted access to the given app or service. Magic links provide an alternative to traditional username/password authentication by leveraging email verification.
While user-friendly, this method may introduce security risks associated with email interception. They are weak because email accounts remain prime targets for phishing and credential-stuffing attacks. An attacker who gains access to a victim’s email account can fraudulently use magic links to access other applications.
Biometric Authentication
Biometric solutions, such as fingerprint or facial recognition, offer convenient and secure authentication. However, the reliance on hardware and platform compatibility may limit widespread adoption.
Biometric authentication relies on specialized hardware like fingerprint scanners or facial recognition sensors, leading to dependency on device compatibility and reliability. Ensuring consistent performance across various platforms and mitigating vulnerabilities in hardware are essential to maintain security and user trust.
Navigating the Transition
While the transition to passwordless authentication holds promise, it presents practical challenges and considerations:
Technological Investment
Adopting advanced authentication methods requires investment in new technologies and infrastructure. Organizations must weigh the benefits of enhanced security against the costs of implementation and maintenance.
User Acceptance
User acceptance plays a crucial role in the adoption of passwordless authentication methods. Organizations must prioritize user experience and provide adequate support and education to facilitate the transition.
Regulatory Compliance
Compliance with industry regulations and standards, especially in Europe, may influence the adoption of passwordless authentication methods. Organizations must ensure alignment with regulatory requirements while enhancing security measures.
rb-
In conclusion, the battle against artificial intelligence based cybersecurity threats is already here. Some steps can taken to fight these challenges. Many of the new protections require changes to the business as usual. By carefully evaluating the benefits and considerations of alternative authentication methods, organizations can navigate this transition effectively and safeguard their digital assets in an increasingly complex threat landscape.
Related article
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
The Age of AI: How to Future-Proof Your Career
Artificial Intelligence (AI) is reshaping IT careers. However, AI will create a demand for different IT staff staffers. Professor Roland Rust at the University of Maryland’s Robert H. Smith School of Business predicts that future jobs will demand different skills. The professor and his team identified skills like “people management, working with others, emotional intelligence and negotiation skills” will be paramount in the age of AI. He points out, “Everybody will be – and already is – working with AI.”
In an article at InsiderPro the professor recommends working with AI, “The key is to recognize that collaborating with AI is essential … it’s best not to compete with it.” He suggests that human workers focus on differentiating themselves from AI. “… human workers should focus on what they are naturally good at, which is people skills.” Rust says that “… workers should develop the skills necessary to interface with AI, and willingly delegate those aspects of the job for which AI is better-suited.”
In the article, Megan Beck, practice manager at global management company Bain & Co., echoes Professor Rust. She predicts that tech professionals will see a shift in how they achieve success. She explained, “… AI is automating cognitive tasks such as data processing, which means that these cognitive tasks are becoming less valued and higher-level tasks, such as creativity and emotional understanding, are becoming more valued.”
What is the feeling economy?
According to Bing, we are in the Thinking Economy. The Feeling Economy is coming. It is being driven by the advancement of AI. While AI is rapidly assuming a larger share of thinking tasks, it is more difficult to automate emotional intelligence. This is where the human worker’s competitive advantage over machines currently lies, as AI is not expected to outperform human beings in subtle skills like empathy, emotion management, and inspiration for many years. The Feeling Economy is expected to flourish in the future.
AI and the rise of the feeling economy
As artificial intelligence becomes more sophisticated, IT professionals need to hone their soft skills that give them an edge over computers. Professor Rust’s research describes the increasing needs for people skills as the “feeling economy.” Researchers analyzed Department of Labor data. They observed a rise in tasks involving emotional intelligence, as opposed to cognitive or physical tasks. They also found that a correlation existed between wage growth and tasks involving emotional intelligence compared to cognitive tasks. Professor Rust observer,
At first, the job skills that require common sense and intuition will be safe … Before too long, though, even those skills will be attained by AI, and at that point, only the emotional and empathetic parts of feeling skills will be the differentiator for people. In general, the more people the job touches, the safer the job is from AI. Management and interpersonal communications are the kinds of job characteristics to look for.
Consulting firm Gartner calls the data social-creative. Emily Rose McRae, director in the Gartner HR practice told InsiderPro, ” … jobs are shifting towards requiring more social-creative skills. This is a trend we expect to see continuing into the future, as AI learns to successfully perform more skills.”
How to future-proof your career
Ms. McRae suggested some introspection, to prepare for a future career that includes a heavy dose of AI:
- Identify your tasks that are repetitive or rule-based.
- If a machine were doing those tasks, what else could you be doing?
- Can you focus more on other, less predictable tasks in your role?
- Would you spend more time working with the output of that machine, finishing the process?
- Would you spend more time in strategy meetings, or collaborating with your team?
She also recommended actively practicing creativity in your job, studies or even a hobby. “Studies show that the biggest factor in being creative is not innate ability, but needing to be creative on a regular basis.”
AI can learn emotional intelligence.
AI will eventually target sophisticated emotional intelligence as well. Mark Beccue, principal analyst at Tractica told InsiderPro, “AI, particularly deep learning, can tap digitally captured data to learn empathy.” He warns, “Emotional intelligence can be developed from previous experiences.”
In terms of existing work, Beccue sees little opportunity in jobs that focus on collecting and processing data. He suggests, “If your job is about the routine processing of information, look for another job …”
Additionally, he say focus on sharpening your nonlinear thinking skills and abstract thinking. Focus on the ability to make connections among unrelated concepts or ideas. Mr. Beccue told InsiderPRO, those naturally drawn to linear thinking are at greater risk.
Recommendations
Bain & Co.’s Beck also recommends that IT pros focus on skills like creativity, persuasion, and leadership: “Workers who want to future-proof their careers should invest in skills that are hard for AI to mimic.”
Gartner’s McRae recommends, “Focus on developing your ability to adapt to new technologies … technology changes and evolves at a very rapid pace, so being adept at learning new technology is incredibly important, and is a skill top employers are seeking.” Martin Fleming, a Fellow of the Productivity Institute sums it up, “Workers who are willing to redesign their jobs, learn new skills and find new ways of working will prosper.”
rb-
It’s all part of a gradual shift from the ‘Thinking Economy,'” which for decades has rewarded cognitive skills, to the “Feeling Economy.” According to the experts, AI is not expected to surpass human capabilities like empathy, emotion management, and inspiration for many years.
We all need to hope that artificial intelligence does develop empathy for humans. Because the current batch mega-tech overlords don’t seem up to protecting society from AI.
The Rising Value of IPv4 Addresses
According to an article at CircleID, the value of IPv4 addresses is set to increase. IPv4 is the traditional way to address devices that attach to the Internet. The world has been running out of these addresses, leading to the development of its successor, IPv6, Despite being available on the public internet since 2011, the new protocol has not been widely implemented. Only about a third of the top 1000 websites globally support it. Meanwhile, existing IPv4 networks have become more efficient in their use of IPv4, reducing the drive to implement IPv6.
Impact of COVID-19 on the IPv4 Market
The COVID-19 pandemic brought significant changes to the IPv4 market. Many firms sold off their IPv4 addresses to raise capital. The article says the IPv4 prices have risen over the past three years. Another factor driving up the price of IPv4 networks is the cloud computing giant, Amazon.
Pricing Changes by Cloud Providers
AWS has announced that starting February 1, 2024, they will begin charging at least $40 per IPv4 address per year. It is anticipated that other cloud giants such as Alibaba, Cloudflare, Google, Microsoft, and Oracle will follow AWS with similar pricing structures. Notably, AWS’s new cost per address is 300% higher than what Microsoft paid for Nortel’s IPv4 address range in 2011.
IPv4 Arbitrage Opportunities
Given AWS’s price exceeding $40 per address per year, the author expects businesses to purchase addresses on the open market at less than AWS’s $40 and migrate them to the cloud. This will save them some of the AWS costs. This strategy is likely to increase demand for IPv4, further contributing to their value increase.
rb-
Organizations holding even a small pool of IPv4 addresses could monetize this asset. By implementing Network Address Translation (NAT) or transitioning to IPV6 on their internal networks, they can free up IPv4 addresses. These addresses can then be sold to networks grappling with the cost increases imposed by the cloud providers.
Related articles
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
What a Glorious Day
Today is a glorious day.
It is National Pizza day !
And
63 degrees in February in Michigan !!!
Related article
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
HP Greedflation
Greedflation prevails more among companies with near-monopolies. In such instances, customers have little choice but to pay the listed price for the good or service due to limited alternatives. Greedflation price hikes are not tied to a legitimate need for a rise in the cost of a good or service.
HP drives greedflation. HP drive greedflation by continuously releasing software updates for its Dynamic Security system. This system bricks HP printers when they’re used with third-party ink cartridges. Resulting in several lawsuits.
HP greedflation
HP CEO Enrique Lores told CNBC, why the company pushes the maligned software. Ars Technica says that the reason for persistently pushing the hated software, is HP’s aim to transform printing into a subscription-based service. Lores said, “Our long-term objective is to make printing a subscription … This is really what we have been driving.”
Lores states that HP locks users out of using HP printers when loaded with a non-HP ink cartridge to protect customers against potential viruses. Lores claims, “We have seen that you can embed viruses in the cartridges … Through the cartridge, [the virus can] go to the printer, [and then] from the printer, go to the network.”
Fake claims
Security experts call BS on Lores. The plausibility of a virus in an ink cartridge being used to perpetrate an attack is low. even calling it “wildly implausible even in a lab setting, let alone in the wild.” Ars points out that HP released HP released Dynamic Security released back in 2016. However, the “research” justifying the cartridge threat didn’t come out till 2022. Additionally, HP established a bug bounty program in 2020. The bounty has largely been aimed at identifying third-party cartridges according to Digital Trends. HP claims third-party cartridges violate its intellectual property (IP) and is another argument for bricking consumers’ printers.
Greedflation – the real reason
The security claim is weak at best. Their decision is to lock their customers HP’s ecosystem to boost profits. Lores told Ars “… this customer doesn’t print enough or doesn’t use our supplies, it’s a bad investment.”
HP’s Instant Ink plan is an example of a subscription service. The Instant Ink plan charges $1.49 per month to print 10 pages, in addition to the cost of buying your printer. Additional pages are available in sets of 10-15 pages, for $1.00 more per set. The cost to the user rises to $27.99 per month on top of the $549.00 base price for a low-volume printer like the HP Color LaserJet Pro MFP M283fdw, plus shipping.
rb-
So, after 3 years of service, you end up paying HP $1,367 for the purchase price for the rights to use your $549 printer. That is 2.5 times the cost subscription over the purchase price.
I know what this customer thinks of this HP greedflation.
Related article
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.