A Quarter of UK Business Are Not Using AI to Bolster Cybersecurity

New research by Hornetsecurity highlights the AI cybersecurity gap affecting UK businesses. Although nearly half (45%) of companies have fallen victim to cyberattacks, 26% are still not using AI to enhance their cybersecurity defences.


The survey, which gathered responses from over 500 C-suite professionals across the UK, reveals that cyber threats are an escalating concern. 85% of respondents acknowledge the increased sophistication of these attacks, largely attributed to AI facilitating the process of threat creation.


Commenting on the findings, Hornetsecurity CEO, Daniel Hofmann, said: “The results show how prevalent cyber crime is – and while 74% of businesses integrate AI into their defences with the goal of blocking threats, there’s a concerning quarter who have yet to use this technology. Businesses must recognise the potential of AI in tackling cyber threats and integrate it in their security strategies to stay ahead of increasingly sophisticated attacks.”


The double-edged sword of AI


The dual nature of AI in cybersecurity continues to trouble professionals across the full range of sectors: an equal 40% of respondents see AI as a mitigator and an exacerbator of cyber threats. Regarding personal experience, the direct split was again repeated: 45% of business leaders found AI helped, and a further 45% reported AI had worsened the threat landscape.


This comes as threat actors increasingly use AI to automate, sophisticate (and sometimes translate) malicious attacks globally. The UK’s National Cyber Security Centre (NCSC) found that AI is lowering the barrier of entry to novice cybercriminals.


Phishing attacks and deep fakes


There’s a clear concern about AI-enhanced phishing attacks, with 58% identifying it as their top worry. Deepfake technology also emerges as a significant concern, with 39% of businesses worried about its potential – and growing – use in cyberattacks.


Despite the challenges, AI plays a cruci ..

Support the originator by clicking the read the rest link below.