HalcyonFT Quarterly Newsletter - Q2 2025 - Updates and Recommendations
Mitigating Risks While Embracing AI
Artificial intelligence adoption is accelerating—and it’s starting to change the way we work. The first half of 2025 gave rise to AI models that integrate information from multiple data sources as well as advancements in coding capabilities and video generation. The speed of advancement is new, often on 90-day product release cycles. Naturally, this rapid pace is increasing production risks and causing regulatory frameworks to shift.
How can we mitigate risk while embracing AI?
Be careful, establish clear AI usage policies: Define which AI tools are approved and what data can be shared.
Use enterprise-grade AI platforms: Opt for solutions with granular administrative controls and use only solutions that disable model training on your data.
Implement data loss prevention: Apply guardrails around sensitive information in your systems that hold sensitive data.
Audit vendors and internal teams: Ensure compliance with internal policies and emerging AI governance standards.
Regulatory impact: Consider your compliance requirements when deploying AI. In particular, the retention policy for chats that your employees utilize. Note that ChatGPT currently has an indefinite legal hold of all chats on all but their Enterprise platform. In March 2025 the SEC fined two investment advisors for not using AI in their Investment process as they had marketed: https://www.sec.gov/newsroom/press-releases/2024-36
Threats Posed by Malicious Browser Extensions
A recent security report has unveiled a sharp increase in malicious and poorly secured browser extensions, creating significant risks for enterprise environments. Several popular Chrome extensions are unwittingly leaking API keys and session tokens through insecure code and connections. When these extensions transmit sensitive data, they expose API keys and present significant privacy and security risks.
The authors of the study found that the exposed API keys could be weaponized “to drive up API costs, host illegal content, send spoofed telemetry data, and mimic cryptocurrency transaction orders.” In other words, popular extensions listed on the official Chrome Web Store could allow attackers to access internal systems and sensitive third-party services.
In response, the study authors recommend that users delete insecure browser extensions. HalcyonFT recommends taking additional protective measures by adopting a browser-native security solution, such Seraphic or Island Enterprise Browser.
Both solutions fight browser exploitation by stopping phishing attempts, identifying malware, and preventing data leakage. We recommend Seraphic over Island because it protects enterprise users directly within their preferred browser. Its built-in cookie encryption defends against session token theft, while its default extension control policy automatically blocks high-risk or unauthorized extensions.
For assistance in determining whether browser-native security is appropriate for you and your company, please reach out to your HalcyonFT point of contact today.
Deepfake Threats
The rapid evolution of AI-powered video and voice technology has unlocked remarkable new possibilities, but these so-called deepfakes are also introducing new risks to businesses.
Major players like OpenAI, Google, and Meta have made it possible to replicate human voices with startling precision and even create convincing video representations of people. While many of these tools are promoted for innovation, accessibility, and entertainment, we're seeing a concerning trend: Bad actors are using them to manipulate, deceive, and impersonate.
From fraudulent voice calls that sound like trusted contacts to fabricated video messages of public figures, the threat landscape is shifting and becoming more sophisticated than ever. Here are some ways to reduce the risk:
Verify the source: If you receive an unexpected call, video, or voicemail, especially one involving financial or operational requests, pause. Suggest using a separate, trusted channel (like a known phone number or verified email) to confirm the sender’s identity.
Be cautious with links: Avoid clicking on links or taking immediate action based on unsolicited video or voice messages, no matter how authentic they appear.
Implement smart safeguards: For organizations, establish secret word protocols and require encrypted authentication for sensitive transactions. These simple practices reduce the risk of falling victim to impersonation or social engineering attempts.
Don’t break protocols: Bad actors often foster a sense of urgency when asking for exceptions or breaks in protocols. Always follow approved processes and avoid making exceptions.
North Korean Operatives Infiltrating U.S. Firms as Remote Workers
As nation-states blur the lines between espionage and cybercrime, organizations must be prepared not only for external breaches, but also for nefarious insiders who never should have been let in to begin with.
Remote work has transformed how companies operate, but now it’s also being used as a cybersecurity weapon. Forbes reports that North Korea has a state-sponsored campaign in which operatives pose as IT professionals to gain access to U.S. organizations, including those in financial services. Posing as U.S. citizens, these operatives help North Korea fund its weapons program and conduct long-term cyber espionage.
These attacks don’t rely on high-tech intrusions alone; rather, they are systematic, well-resourced, and strategically designed to exploit the trust and blind spots in remote hiring and access control. They follow a consistent pattern of using the stolen identities of U.S. citizens, leveraging AI-generated video deepfakes to impersonate American professionals during interviews, having employers ship work laptops to U.S.-based addresses that are actually “laptop farms,” and then installing malware or backdoors for persistent network access, data theft, or extortion through ransomware.
The financial services sector presents a particularly high-value target, given their direct access to capital, sensitive client data, and growing reliance on managed service providers. To defend against such threats, HalcyonFT recommends taking the following measures:
Strengthen identity verification for all remote hires, particularly for roles with elevated access.
Consider behavior-based monitoring, especially for remote and contractor devices.
Enforce strict asset management to know where devices are and who has access.
Segment and restrict access using Zero Trust principles, limiting what any user or device can reach without additional authentication.
Protect Your Eyes at the Computer
If you spend most of your day in front of a computer screen, you’ve likely experienced dry eyes, headaches, or blurry vision. Digital eye strain affects millions of office workers, but a few small changes to your routine can make a big difference.
The American Optometric Association defines digital eye strain, or computer vision syndrome, as “a group of eye- and vision-related problems that result from prolonged computer, tablet, e-reader and cell phone use.” Many sufferers experience eye fatigue, blurred vision, and headaches, but a few simple and inexpensive changes can go a long way to alleviate symptoms.
Behavior: Blink often, use a humidifier if needed, and take frequent breaks. The 20-20-20 rule suggests taking a 20-second break every 20 minutes to look at something 20 feet away.
Settings: Match monitor brightness to your room lighting, use dark mode, increase text size, and use warmer tones to reduce blue light.
Software: Consider using Windows Night Light or macOS Night Shift to automatically adjust screen color temperature based on time of day.
Hardware: Buy a large, curved, high-resolution monitor that reduces eye strain.
Ergonomics: Invest in a desk that helps you maintain proper posture, and position your monitor so the top of the screen is at or slightly below eye level, 20-30 inches away.
Eyewear: Ask your optometrist about lubricating eye drops and prescription lenses that are optimized for screen distance and have blue light filters or anti-reflective coatings.\
As more of our working hours are spent on a computer, taking care of your eyes is an essential component of staying comfortable and productive all day.
HalcyonFT Named One of the Best Workplaces in the Bay Area
Great Place To Work® and Fortune magazine have honored HalcyonFT as one of this year's Best Workplaces in the Bay Area. Honorees were selected by reviewing nearly 85,000 confidential survey responses from employees at regional companies to develop a comprehensive picture of the workplace experience.
"Being named one of the Best Workplaces in the Bay Area is an incredible honor that reflects the heart of our culture—our people," said Managing Partner Rodric O'Connor. "We stand firm in our belief that fostering trust, collaboration, and respect across every level of the organization drives a workplace where people thrive while providing exceptional, white-glove service to our clients."
For more information, please read our press release.
We’re here to help.
Thank you, as always, for your business, and please reach out with any questions or concerns.
— Your HalcyonFT Team
{ HALCYONFT UPDATES }
More Insights
{ CONTACT }