What is vendor management?
Vendor management is the act of ensuring that your third-party vendors meet regulatory requirements and contractual obligations. This safeguards your business from …
Heuristic rules are mental shortcuts or educated guesses that humans and machines use to make decisions or solve problems quickly. These are often (but not always) used in situations with limited information.
To that end, heuristics help remove complexity by relying on past experience, intuition or “rules of thumb.” However, while such rules promote faster decisions, they sometimes cause errors or biases.
The drivers of heuristic rules are rooted in the need for speed, efficiency and cognitive simplicity.
These drivers include:
Here are five cognitive biases that apply in finance and cybersecurity with a few examples that clarify their use.
The availability heuristic occurs when decisions are influenced by readily available information such as recent experiences or easily recalled events.
This heuristic can affect investment decisions, risk assessments and client recommendations.
But it can also be used in a phishing attack where fraudsters:
In each case, the fraudster attempts to add credibility to their scam by referencing recent, memorable or internal events.
The anchoring heuristic occurs when individuals place too much importance on an initial piece of information (the anchor) and adjust from there.
In a business acquisition, the target company may set a high initial price which serves as the anchor. Even if data indicates that the company is worth less, buyers tend to base their offer near the anchor price and may overpay.
The representativeness heuristic causes individuals to judge the probability of an event by how closely it resembles a stereotype or experience.
Investor behaviour is a classic example of this rule. An investment analyst could assume that because a tech company performed well in the past, similar companies will also outperform the market.
In the process, this mental shortcut overlooks other critical factors that could impact performance, such as market conditions, regulatory changes or the quality of the company’s management.
The familiarity heuristic drives decisions based on what feels familiar or comfortable.
In a phishing attack, criminals exploit the tendency for employees to comply with the instructions of trusted colleagues, superiors or entities.
Familiar request formats (such as password resets or unpaid invoice notices) are also used to lower the defences of an employee and have them click on malicious links or reveal sensitive data.
The scarcity heuristic causes individuals to perceive something as more valuable if it is rare or limited.
When a company holds an IPO, investors often make hasty decisions to buy shares based on a fear of missing out. Airbnb, for example, opened at $146 per share on the NASDAQ – a number that far exceeded its IPO price of $68.
In cybersecurity, heuristic rules serve as quick, predefined checks that increase the efficiency of machine learning-based fraud prevention. As a consequence, they use fewer resources and minimise load on the system.
As in other contexts, however, the use of heuristic rules in this context is not without its trade-offs. Since the focus is on speed, factors such as precision and accuracy may be impacted.
Nevertheless, to understand how heuristics apply to cybersecurity, let’s look at a few different use cases.
In a detection system that prevents bonus abuse, for example, transactions are blocked based on previously identified data points such as user ID, email address and browser hashes.
Here’s an abbreviated description of how this process may work in practice:
False positives are always a risk with heuristics-based fraud prevention. However, many companies prefer false positives (where transactions involving authentic users are blocked) to false negatives (where the opportunity to block fraudulent transactions is missed).
Heuristics are also used in most antivirus software to search for specific commands or instructions not typically found in applications.
Like fraud prevention, heuristics in virus detection use rule or weight-based systems to determine acceptable levels of risk. If rules exceed predetermined thresholds, alerts are triggered and pre-emptive action is taken.
Here are some techniques that antivirus software uses to detect known viruses and also identify new ones:
While these heuristic-based methods may also throw up the occasional false positive, they complement traditional solutions that compare suspect files to databases of previously discovered malware.
Heuristics are also used to detect various forms of phishing and block or flag suspicious emails before they reach their intended recipient.
Rules examine specific email attributes such as:
Summary:
Vendor management is the act of ensuring that your third-party vendors meet regulatory requirements and contractual obligations. This safeguards your business from …
Multi-factor authentication (MFA) is a security method that requires users to prove their identity using two or more distinct factors before accessing …
Imposter scams are a type of fraud where scammers pretend to be trusted individuals, companies, or government agencies to deceive victims into …
End-to-end B2B payment protection software to mitigate the risk of payment error, fraud and cyber-crime.