Back to the MIT repository
4. Malicious Actors & Misuse2 - Post-deployment

Financial and business

Financial and Business - Use or misuse of a technology system in a manner that damages the financial interests of an individual or group, or which causes strategic, operational, legal or financial harm to a business or other organisation.

Source: MIT AI Risk Repositorymit953

ENTITY

1 - Human

INTENT

3 - Other

TIMING

2 - Post-deployment

Risk ID

mit953

Domain lineage

4. Malicious Actors & Misuse

223 mapped risks

4.3 > Fraud, scams, and targeted manipulation

Mitigation strategy

1. Implement Robust Internal Controls and Advanced Access Security: Establish strict internal controls, including mandatory segregation of duties and administrative dual approval for all high-risk financial and system configuration changes. Furthermore, enforce multi-factor authentication (MFA) and adaptive authentication across all applications processing sensitive data to prevent unauthorized access via compromised credentials. 2. Mandate Continuous Employee Education on Social Engineering: Deploy comprehensive and recurring security awareness training programs designed to educate all personnel on recognizing and resisting evolving social engineering and manipulation tactics, such as phishing, urgency-based scams, and deepfakes. Training must explicitly reinforce protocols for independent verification of payment requests and suspicious communications. 3. Maintain Proactive Risk Assessment and Incident Response Frameworks: Conduct regular, formalized fraud risk assessments to identify and prioritize the organization's specific vulnerabilities to fraud and misuse, particularly concerning new technology systems like AI. Develop and periodically test a clear incident response plan that ensures rapid containment, forensic analysis, stakeholder communication, and post-incident adjustment of security measures.