Accessibility Resource CenterSkip to main content
About UsCareers
Support
Our Company
  • Our Company Overview
  • Who We Are Who We Are
    • Overview
    • Our Culture
    • History and Timeline
    • Headquarters & Contact Info
    • Verizon Fact Sheet
    • Leadership
  • What We Do What We Do
    • Overview
    • 5G
    • Innovation Labs
    • 4G LTE
    • Broadband & Fiber
    • Internet of Things
    • Managed Security
    • Verizon Ventures
  • How We Operate How We Operate
    • Overview
    • Code of Conduct
    • Management Governance
    • Open Internet
    • Policies
    • Retiree Information
    • State Government Affairs
 
News
  • News Center News Center
    • News Center
    • Networks & Platforms
    • Products & Plans
    • Responsible Business
    • Financial
    • Public Safety
    • Noticias
  • News Releases News Releases
    • News Releases
    • Media Contacts
    • B-roll and images
    • RSS Feeds
    • Emergency resource center
    • Verizon Fact Sheet
 
Responsibility
  • Responsibility Overview Responsibility Overview
    • Responsible Business Report
  • Digital Inclusion Digital Inclusion
    • Overview
    • Verizon Innovative Learning
    • Verizon Innovative Learning HQ
    • Small Business Program
  • Environmental Responsibility Environmental Responsibility
    • Disaster Resilience
  • Human Prosperity Human Prosperity
    • Overview
    • Reskilling Program
    • Employee Volunteers
  • Sharing our Success Sharing our Success
    • Overview
    • Giving and Grants
    • Employee Giving
  • Product Responsibility Product Responsibility
    • Overview
    • Accessibility
    • Account Security
    • Privacy Policy
  • Parenting in a Digital World Parenting in a Digital World
    • Overview
    • Digital Parenting 101
    • Young children 3-8
    • Preteens 9-12
    • Teenagers 13-18
    • By topic
    • Meet the editorial team
 
Investors
  • Investor Relations overview
  • Financial Reporting Financial Reporting
    • Overview
    • SEC Filings
    • Annual Reports
    • Quarterly Earnings
    • Stock Information
    • Dividend History
    • Tax Information
    • Fixed Income
    • Asset-backed Securitization
  • Corporate Governance Corporate Governance
    • Overview
    • Board of Directors
    • Board Committees
  • Shareowner Services Shareowner Services
    • Overview
    • Cost Basis Calculator
    • Shareowner FAQs
  • Responsible Business Reporting Responsible Business Reporting
    • Overview
  • News & Events News & Events
    • Investor Events & Webcasts
    • Investor News
    • Investor Calendar
    • Email Alerts
  • Contact Investor Relations
 
Support
About UsCareers
end of navigation menu
  1. About
  2. News
  3. Networks & Platforms
  4. Thought Leadership
  5. "Is the AI Threat Inversely Proportional to Human Error?"
News Center
  1. Menu
    All News
    Networks & Platforms
    Products & Plans
    Responsible Business
    Public Safety
    Financial
    Noticias
    News Releases
    Media Contacts
    B-roll and images
    Verizon Fact Sheet
    RSS Feeds
    Emergency Resources
    Cable Facts
05/07/2024|Networks & Platforms|Thought Leadership

"Is the AI Threat Inversely Proportional to Human Error?"

By: Chris Novak
2024 Data Breach Investigations Report

Today, it’s easy to find someone who thinks AI is the world’s largest cybersecurity threat. Luckily, I’m happy to report it’s not a threat – at least, not yet. Could it become a threat? Yes, but it’s important to understand a couple of things first. One, there are many more pressing cybersecurity threats to focus on. Two, conditions of the threat landscape will determine whether and when AI might be commandeered for nefarious purposes. So, let’s take a look at the landscape in order to start tracking AI’s potential hacking trajectory.

There are some hacking use cases for AI: social engineering and pretexting, which essentially refer to tricking users into divulging sensitive information and masquerading as a trusted person or institution in order to gain trust from a network user. Generative AI’s large language models have become quite sophisticated and can mimic people’s speech patterns in a number of different languages, effectively enabling threat actors to scale their social engineering attacks around the globe. Deepfakes have also gotten very good, which would be especially compelling for “vishing,” or voice phishing, attacks. Vishing is simple but very effective. Some of the biggest hacks in recent years owe to vishing tactics. You might be wondering why hackers don’t avail themselves of these incredible technologies. Well, they don’t need them.

Many people labor under the assumption that hackers use the most cutting-edge technologies to crack digital Fort Knoxes, but the truth is malicious actors look for the biggest paydays with the least resistance. Simple attacks – phishing, basic web application attacks, etc. – already work very well. Why would hackers choose a more complex route? They wouldn’t, unless they had to.

The human element has factored in the majority of cybersecurity breaches for years. Last year was no different. According to the Verizon Business 2024 Data Breach Investigations Report (DBIR), more than two-thirds of breaches (68%) involved a non-malicious human element, which can refer to a user falling victim to a social engineering attack or making some other type of error. Hackers prey on human fallibility.

Encouragingly, this year’s DBIR revealed that employees are more likely to identify and report breach attempts, phishing emails, and even their own mistakes, like clicking on a malicious link. For instance, 20% of users identified and reported phishing in simulation engagement, and 11% who clicked the email also reported it. This is a good sign because timely reporting is an effective way to stem the spread of a security incident, preventing it from becoming a full-scale breach. It also suggests that cybersecurity awareness is on the rise and that making a cybersecurity-related mistake is not the stigma it once was. These emerging trends are encouraging and may over time serve to minimize the impact of the human element. Might that close off some of the easier paydays for hackers? Possibly. In that scenario, would they turn to AI? Probably.

How would the security landscape change if most hackers were utilizing AI? It would become virtually impossible to distinguish between the real and the artificial. Emails, text messages, voice calls and even video calls could not be trusted. In that world, a zero-trust approach, a model that acknowledges threats can come from anywhere and requires strict, continual authentication of users, would be a necessity. While a heavy lift for some organizations, if you’re looking to stay ahead of the curve with regard to security, zero trust is an effective strategy.

AI may become a cybersecurity threat, just as quantum computing, which could transform the requirements of encryption protocols overnight, may become a cyber threat one day. This remains speculation for the time being. While it’s important to stay abreast of developments within cybersecurity, we’d do well to keep our eyes trained on the more immediate threats. Still, it’s important to remember that as we plug security holes like the human element, and as more conventional routes are blocked, malicious actors will look for new tactics.

Tags:
Cybersecurity

Related Articles

Cybersecurity threats are on the rise: What to know so you can address them
05/02/2024
The 2024 DBIR analyzes more than 30k real-world security incidents and more than 10k data breaches across 94 countries, providing actionable insights leaders can use to keep their companies safe
25 business predictions for 2025
01/22/2025

Verizon Business leaders share 25 predictions for 2025, spanning AI, cybersecurity, private networks, and customer experience to help businesses make informed technology and strategy decisions.

Whether you are raising a concern or have only a question, we want you to know it’s important to us. You are about to visit a third-party website, and the information you provide will be submitted directly to Verizon Ethics. If you have any questions about how the information you share will be used, please view our Ethics Privacy Notice.

Proceed
Services & Solutions
  • Verizon.com
  • Mobile Plans
  • Mobile Devices
  • Home Services
  • Small and Medium Business
  • Enterprise Solutions
  • Verizon Connect
  • Public Sector
  • Partner Solutions
Support
  • Mobile Online Support
  • Home Online Support
  • Contact Customer Support
  • Sign in to your Account
  • Store Locator
  • Account Security & Fraud Claims
  • Accessibility
Innovation
  • Innovation Labs
  • Verizon Ventures
Network Technologies
  • 4G LTE
  • 5G
  • Fiber Optics
  • Multi-Access Edge Compute (MEC)
Careers
  • Welcome to the #VTeamLife
  • Life at Verizon
  • Culture & Diversity
  • Search Open Roles
  • Careers Site Map
Follow Verizon News
  • twitter
  • instagram
Follow Inside Verizon
  • twitter
  • instagram
Follow Verizon Careers
  • linkedin
  • twitter
  • instagram
Follow Customer Support
  • facebook-official
  • twitter
Follow VerizonGreen
  • twitter
  • Privacy Policy
  • California Privacy Notice
  • Health Privacy Notice
  • Your Privacy Choices
  • Terms & Conditions
  • Accessibility
  • Open Internet
  • Important Consumer Information
  • About Our Ads
  • Site Map
© 2025 Verizon