749 views
Top Positive and Negative Impacts of AI & ML
on Cybersecurity
Tweet
With great power comes great responsibilities- it is the most iconic phrase written by Stan Lee
and popularized by Spider-Man. Undoubtedly the line holds to disruptive technologies, including
AI and ML.
You might have heard only praise and good things about AI and ML, but that does not mean that
they cannot become a bitter enemy to humanity. AI & ML are advanced technologies bound to
function under the administrator’s command.
Arti몭cial Intelligence (AI) and Machine Learning (ML) technologies have many positive
applications, from helping researchers better understand neural pathways in the brain to
Varun Bhagat - September 3, 2021  0


assisting law enforcement with identifying suspects in criminal investigations.
They are renowned for the greater good of cybersecurity. However, these technologies also hold
the potential to ruin our perfectly running digital world and become a source of power to the
dark web users/administrators.
If you’re not familiar with how AI and ML might impact cybersecurity, this blog will discuss both
sides of the coin and help you better understand how this technology might a몭ect you one day
soon.
Here are some famous AI-based cybersecurity use cases:
# As per Forbes, 69% of enterprises trust AI for handling cyber attacks.
# As much as 80% of telecommunication industries believe that without AI, cyber security is not
feasible.
# Network security uses AI up to 75% in developed nations, as per Statista.
# Cloud security accounts for nearly 59% of use cases of Arti몭cial Intelligence.
# According to Oracle, 62% of U.S based enterprises have already implemented AI for cyber
security applications.
# IBM says AI’s most outstanding contribution in cyber security is the speed of analyzing threats
with an acceleration up to 64%.
Look at the infographic below depicting a section of the above stats:
Source: Statista
A lot has been explored in recent years about how little we know about security. If you ask ten
di몭erent cybersecurity experts, you will likely get ten unique answers. However, many are
unfamiliar with the exact aspects of cyber security.
It isn’t necessarily a bad thing because there is no one-size-몭ts-all approach to cybersecurity.
What works for one 몭rm might fail to work for another in a completely di몭erent industry or with
entirely di몭erent kinds of data; Similarly, what works in one country might not work in another
country. However, everyone agrees to the de몭nition below.
What is Cybersecurity?
Cybersecurity is a proactive defense against hackers, cybercriminals, data theft, and other
cybersecurity threats. Security experts work with IT professionals to identify weaknesses in
systems before intruders can exploit them.
Source: Statista
Businesses need to incorporate cybersecurity into their overall business plan to prevent losses
due to cybersecurity issues. It means implementing tools like encryption software (including
secure mobile device management), building alliances with local law enforcement agencies, or
hiring external cybersecurity teams.
In addition to helping keep your customers’ data safe, these strategies will also help strengthen
your company’s bottom line by protecting its assets from theft and damage in an increasingly
digital world.
Companies must be 몭exible enough to customize their security strategies as needed so they can
adapt to new threats without slowing down their business processes too much.
adapt to new threats without slowing down their business processes too much.
Major Cybersecurity Threats in 2021
#1. Malware: These are software programs designed to disrupt computer operation, gather
sensitive information, or access private computer systems. Malware often arrives as spam
messages containing attachments or links that download viruses and worms onto their
computers when clicked on by users.
#2. Ransomware: It hijacks your computer, encrypts all of your 몭les, and then demands a
ransom payment for you to get them back. These sorts of attacks are becoming increasingly
popular with criminals due to their success rate.
#3. Social Engineering Attacks: It is a deception that exploits human nature to trick people into
giving up sensitive information or performing actions that harm their organizations.
#4. Phishing: It is social engineering typically carried out through email spoo몭ng or instant
messaging that aims to steal personal information such as usernames, passwords, and credit
card details by masquerading as trustworthy entity in an electronic communication.
#5. PDF Scams: Using a PDF 몭le to scam is a common exploit used by malicious hackers. In
general, these types of attacks are tough to detect.
#6. Database Exposure Threat: Occurs when sensitive data stored on a server gets exposed to
an unauthorized third party.
#7. Credential Stu몭ng: These are automated, web-based attacks in which attackers gather a list
of usernames and passwords stolen from one website or application and use them to try logging
into other sites and applications.
#8. Accidental Sharing: It is a scenario when users share con몭dential information without
realizing they are doing so. It occurs when users intend to share a document only with their
colleagues or manager, but it accidentally gets shared with all other users on an email
distribution list.
That was all about the common cybersecurity threats; let’s explore how AI & ML in몭uences them.
Positive Impacts of AI & ML Over Cybersecurity Threats
1. Combating Fraud & Anomalies
Anti Fraud use cases are more e몭ective with machine learning as they can monitor transactions,
behavioral patterns of users, or click patterns more e몭ectively. Using Machine Learning for fraud
detection is very e몭cient compared to traditional methods that require a lot of human labor.
In a recent study, Forbes reported that account takeovers (ATO) decreased from 33% to 17%, and
revenue per client increased by 65%. With machine learning, 몭nancial institutions can block
millions of fraudulent transactions before reaching consumers.
millions of fraudulent transactions before reaching consumers.
The industry is ripe for applying new techniques like deep neural networks, which allow analyzing
large volumes of information at rapid speeds without compromising accuracy. AI algorithms also
help reduce Internet tra몭c snarls caused by malicious bots trying to access web applications
from various browsers on devices. This can be achieved by hiring top AI developers.
2. Handling Spams
Researchers found that the average word length in an email has increased, suggesting that
scammers are putting more e몭ort into creating authentic-sounding messages. Because of these
complications, a straightforward solution will not be e몭ective at entirely thwarting spam accounts
– but using arti몭cial intelligence does it.
Using advanced AI models called generative adversarial networks (GANs), researchers at MIT
were able to develop algorithms capable of distinguishing between bots and humans with
incredible accuracy.
3. Smart Malware Detection
Intelligent malware detection software was developed by computer scientists to detect malware
using a set of predetermined rules based on known malware automatically. Intelligent anti-
malware uses machine learning, or arti몭cial intelligence, to learn what is safe code and what is
malicious code.
Over time, smart anti-malware can quickly recognize new varieties of malicious code and create
rules that help it determine if speci몭c actions are suspicious or hostile. Not only do intelligent
anti-malware keep data protected, but its ability increases as hackers develop new methods for
attacking computers.
4. Data Leak Prevention
With massive amounts of data collected on people’s online habits, companies must use their
immense stores of data responsibly. With arti몭cial intelligence (AI) and Machine Learning (ML),
companies can now mine their big data sets to understand better what kinds of activities might
pose data leak risks.
The most vulnerable data types include customer credit card numbers, social security numbers,
or health records, all pieces of information worth protecting from external threats. However,
current cybersecurity methods aren’t capable of preventing all potential threats e몭ectively.
Negative Impact of AI & ML Over Cybersecurity Threats
1. Malware
AI-based malware is more e몭cient in hiding from the reach of the anti-malware software. Thus,
when the software 몭nds and eliminates malware, the hackers would have already gained
potential information from the user’s device.
2. Botnet
Bots are pieces of software that run automated tasks on a compromised system. Malware
authors often use them for malicious purposes like attacking websites or other computers and
stealing information from infected systems.
One such malware has been Cryptolocker, which aggressively spreads itself via spam messages
posing as speeding tickets. It encrypted users’ 몭les until they paid a ransom in BitCoins to get
their data back.
A botnet is a matrix of computers controlled by an attacker through malware installed on each
computer. Combining these two has made it easy for criminals to wreak havoc online, earning
them pro몭t at the cost of innocent users’ privacy and security.
3. Phishing
ML-based spoof emails are more e몭ective and successful in stealing credentials. It is mainly
because ML algorithms are reasonably successful in creating instant messages and emails that
look like they are from trustworthy resources.
4. ML-based Password Generators
Common passcode guesses include-123456789, date of birth, name of your close family
members, etc. With most websites encouraging solid passwords, it has become a hard nut to
crack the users’ passwords.
However, ML-based algorithms have already been developed that guess passwords accurately.
PassGan is a famous example of password guessing software using the ML algorithm for the job.
So, we can expect more revolutionary password generators from hackers.
Wrapping Up
That was all about how Arti몭cial Intelligence and ML are in몭uencing the security of the digital
world. Under the right hands, they are a boon to humanity, but they can quickly turn into a bane
on the corrupt hands.
As for now, upgrade your security with these technologies to stay in the competition. Connect
with a Machine Learning company in India to maximize your cybersecurity.
Categories: Blog • Enterprise Technology
749 views
Varun Bhagat
PixelCrayons
Varun Bhagat is a technology geek and works as a Sr. IT Consultant with
Varun Bhagat is a technology geek and works as a Sr. IT Consultant with
PixelCrayons, a web & software development company in India.He possesses
in-depth knowledge of mobile app development & web development
technologies and helps clients to choose the best platforms as per their needs.
Author Rank: 22
View All Posts »
Join CustomerThink, get e-book The Top 5 Practices of Customer Experience Winners!
New Editor's Picks
My Customer is So Annoying! How to Rationally Decide if the Time Has Come to Sack Them
Top 12 2022 B2B Marketing Trends to Watch
When Customer Support is the only number Part I
Selling to Named Accounts: A Working De몭nition of High, Wide, and Deep
5 Things IT Needs to Know About Product-Led Growth Strategies
LEAVE A REPLY
Comment:
Name:*
Email:*
Website:
 Notify me when new comments are added
Save my name, email, and website in this browser for the next time I comment.
 Notify me when new comments are added
POST COMMENT
New Posts
My Customer is So Annoying! How to Rationally Decide if the Time Has Come...
Colin Shaw - January 16, 2022
Why Every Website Should Have a Blog
Uwe Dreissigacker - January 16, 2022
Don’t Leave Your Customers Stranded
Jim Tincher - January 16, 2022
8 Tips to Design an Effective Landing Page
Gloria Chow - January 16, 2022
Top 12 2022 B2B Marketing Trends to Watch
Matt Heinz - January 16, 2022
Trending
Top 10 most viewed posts published in last 30 days.
1. The Top 10 Google Algorithm Updates of 2021 [Infographic]
2. Customer Service from the Customer Side
3. 6 CX trends uprooting 2022 planning
4. 10 B2B Marketing Trends to Watch in 2022
5. 2022 Trends: Discover the Future of Call Centers
6. Customers Are Changing. Are You Ready with The Next Best Thing in Customer Strategy?
7. Potentially, How Will The Future Of Work And ‘The Great Resignation’ Impact Customer Experience?
8. B2B sales enablement trends 2022 – Becoming future 몭t
9. 3 Data Collection Trends Critical to Customer Retention in 2022
10. 2022 Will Change the Status Quo in Customer Experience. Here’s How
Top 10 Authors
1. Steven Van Belleghem
2. Thomas Wieberneit
3. Lynn Hunsaker
4. Nikunj Gundaniya
5. Mitul Makadia
6. Liliana Petrova
7. Vivek Goel
8. Jitu Bhaskar
9. Dave Fish
10. Nicholas Zeisler
See all ranked authors »
Recent Comments
Michael Lowenstein on My Customer is So Annoying! How to Rationally Decide if the Time Has Come to Sack
Them
Colin Shaw on Customers Are Changing. Are You Ready with The Next Best Thing in Customer Strategy?
Herbert Asuquo on Customers Are Changing. Are You Ready with The Next Best Thing in Customer Strategy?
Vrushali Rao on 5 Ways to Boost Your Website’s Domain Authority
Ankita Singh on To Apologize or Not To Apologize
Sharon-Drew Morgen on Customer Service from the Customer Side
Michael Lowenstein on Customer Service from the Customer Side
Sharon-Drew Morgen on Customer Service from the Customer Side
Michael Lowenstein on Customer Service from the Customer Side
Vrushali Rao on How to Take Your Video Marketing Strategy to the Next Level
Featured Marketplace Listings
Best Practices to Prove the Business Value of Customer Experience
Hooked On Customers: The Five Habits of Legendary Customer-Centric Companies
Build everlasting customer relationships with the world's favorite CRM
All Listings »
MarketPlace
Featured Listings
Best Practices to Prove the Business Value of Customer Experience
CustomerThink’s research 몭nds just 19% of CX initiatives can show tangible bene몭ts. Due to the COVID-19
crisis, the ROI issue is now front and center with CX leaders. Learn the best ways to prove the business value
of CX, including ROI advice in customer feedback, customer service, and CX infrastructure.
Hooked On Customers: The Five Habits of Legendary Customer-Centric Companies
Combining his own professional experiences working as a CEO with his extensive research and expertise as an
international authority on customer relationships, author Bob Thompson reveals the 몭ve routine
organizational habits of successful customer-centric businesses: Listen, Think, Empower, Create, and Delight.
Build everlasting customer relationships with the world's favorite CRM
Connect with customers across channels using Zoho's omnichannel platform that integrates with 45+ apps &
500+ popular app extensions, including G-Suite, O몭ce 365, MailChimp, Zendesk & more. Get a 15-day FREE
trial now!
trial now!
All Listings »
ABOUT US
CustomerThink is the world's largest online community dedicated to customer-centric business strategy.
Join us, and you'll immediately receive the e-book The Top 5 Practices of Customer Experience Winners.
Contact us: service@customerthink.com
About Us Terms of Use Privacy Policy Advertise How to Contribute Join Log In
© 1998-2022 CustomerThink Corp.

Top Positive and Negative Impacts of AI & ML on Cybersecurity

  • 1.
    749 views Top Positive and Negative Impacts of AI & ML on Cybersecurity Tweet With greatpower comes great responsibilities- it is the most iconic phrase written by Stan Lee and popularized by Spider-Man. Undoubtedly the line holds to disruptive technologies, including AI and ML. You might have heard only praise and good things about AI and ML, but that does not mean that they cannot become a bitter enemy to humanity. AI & ML are advanced technologies bound to function under the administrator’s command. Arti몭cial Intelligence (AI) and Machine Learning (ML) technologies have many positive applications, from helping researchers better understand neural pathways in the brain to Varun Bhagat - September 3, 2021  0  
  • 2.
    assisting law enforcementwith identifying suspects in criminal investigations. They are renowned for the greater good of cybersecurity. However, these technologies also hold the potential to ruin our perfectly running digital world and become a source of power to the dark web users/administrators. If you’re not familiar with how AI and ML might impact cybersecurity, this blog will discuss both sides of the coin and help you better understand how this technology might a몭ect you one day soon. Here are some famous AI-based cybersecurity use cases: # As per Forbes, 69% of enterprises trust AI for handling cyber attacks. # As much as 80% of telecommunication industries believe that without AI, cyber security is not feasible. # Network security uses AI up to 75% in developed nations, as per Statista. # Cloud security accounts for nearly 59% of use cases of Arti몭cial Intelligence. # According to Oracle, 62% of U.S based enterprises have already implemented AI for cyber security applications. # IBM says AI’s most outstanding contribution in cyber security is the speed of analyzing threats with an acceleration up to 64%. Look at the infographic below depicting a section of the above stats: Source: Statista
  • 3.
    A lot hasbeen explored in recent years about how little we know about security. If you ask ten di몭erent cybersecurity experts, you will likely get ten unique answers. However, many are unfamiliar with the exact aspects of cyber security. It isn’t necessarily a bad thing because there is no one-size-몭ts-all approach to cybersecurity. What works for one 몭rm might fail to work for another in a completely di몭erent industry or with entirely di몭erent kinds of data; Similarly, what works in one country might not work in another country. However, everyone agrees to the de몭nition below. What is Cybersecurity? Cybersecurity is a proactive defense against hackers, cybercriminals, data theft, and other cybersecurity threats. Security experts work with IT professionals to identify weaknesses in systems before intruders can exploit them. Source: Statista Businesses need to incorporate cybersecurity into their overall business plan to prevent losses due to cybersecurity issues. It means implementing tools like encryption software (including secure mobile device management), building alliances with local law enforcement agencies, or hiring external cybersecurity teams. In addition to helping keep your customers’ data safe, these strategies will also help strengthen your company’s bottom line by protecting its assets from theft and damage in an increasingly digital world. Companies must be 몭exible enough to customize their security strategies as needed so they can adapt to new threats without slowing down their business processes too much.
  • 4.
    adapt to newthreats without slowing down their business processes too much. Major Cybersecurity Threats in 2021 #1. Malware: These are software programs designed to disrupt computer operation, gather sensitive information, or access private computer systems. Malware often arrives as spam messages containing attachments or links that download viruses and worms onto their computers when clicked on by users. #2. Ransomware: It hijacks your computer, encrypts all of your 몭les, and then demands a ransom payment for you to get them back. These sorts of attacks are becoming increasingly popular with criminals due to their success rate. #3. Social Engineering Attacks: It is a deception that exploits human nature to trick people into giving up sensitive information or performing actions that harm their organizations. #4. Phishing: It is social engineering typically carried out through email spoo몭ng or instant messaging that aims to steal personal information such as usernames, passwords, and credit card details by masquerading as trustworthy entity in an electronic communication. #5. PDF Scams: Using a PDF 몭le to scam is a common exploit used by malicious hackers. In general, these types of attacks are tough to detect. #6. Database Exposure Threat: Occurs when sensitive data stored on a server gets exposed to an unauthorized third party. #7. Credential Stu몭ng: These are automated, web-based attacks in which attackers gather a list of usernames and passwords stolen from one website or application and use them to try logging into other sites and applications. #8. Accidental Sharing: It is a scenario when users share con몭dential information without realizing they are doing so. It occurs when users intend to share a document only with their colleagues or manager, but it accidentally gets shared with all other users on an email distribution list. That was all about the common cybersecurity threats; let’s explore how AI & ML in몭uences them. Positive Impacts of AI & ML Over Cybersecurity Threats 1. Combating Fraud & Anomalies Anti Fraud use cases are more e몭ective with machine learning as they can monitor transactions, behavioral patterns of users, or click patterns more e몭ectively. Using Machine Learning for fraud detection is very e몭cient compared to traditional methods that require a lot of human labor. In a recent study, Forbes reported that account takeovers (ATO) decreased from 33% to 17%, and revenue per client increased by 65%. With machine learning, 몭nancial institutions can block millions of fraudulent transactions before reaching consumers.
  • 5.
    millions of fraudulenttransactions before reaching consumers. The industry is ripe for applying new techniques like deep neural networks, which allow analyzing large volumes of information at rapid speeds without compromising accuracy. AI algorithms also help reduce Internet tra몭c snarls caused by malicious bots trying to access web applications from various browsers on devices. This can be achieved by hiring top AI developers. 2. Handling Spams Researchers found that the average word length in an email has increased, suggesting that scammers are putting more e몭ort into creating authentic-sounding messages. Because of these complications, a straightforward solution will not be e몭ective at entirely thwarting spam accounts – but using arti몭cial intelligence does it. Using advanced AI models called generative adversarial networks (GANs), researchers at MIT were able to develop algorithms capable of distinguishing between bots and humans with incredible accuracy. 3. Smart Malware Detection Intelligent malware detection software was developed by computer scientists to detect malware using a set of predetermined rules based on known malware automatically. Intelligent anti- malware uses machine learning, or arti몭cial intelligence, to learn what is safe code and what is malicious code. Over time, smart anti-malware can quickly recognize new varieties of malicious code and create rules that help it determine if speci몭c actions are suspicious or hostile. Not only do intelligent anti-malware keep data protected, but its ability increases as hackers develop new methods for attacking computers. 4. Data Leak Prevention With massive amounts of data collected on people’s online habits, companies must use their immense stores of data responsibly. With arti몭cial intelligence (AI) and Machine Learning (ML), companies can now mine their big data sets to understand better what kinds of activities might pose data leak risks. The most vulnerable data types include customer credit card numbers, social security numbers, or health records, all pieces of information worth protecting from external threats. However, current cybersecurity methods aren’t capable of preventing all potential threats e몭ectively. Negative Impact of AI & ML Over Cybersecurity Threats 1. Malware AI-based malware is more e몭cient in hiding from the reach of the anti-malware software. Thus, when the software 몭nds and eliminates malware, the hackers would have already gained potential information from the user’s device.
  • 6.
    2. Botnet Bots arepieces of software that run automated tasks on a compromised system. Malware authors often use them for malicious purposes like attacking websites or other computers and stealing information from infected systems. One such malware has been Cryptolocker, which aggressively spreads itself via spam messages posing as speeding tickets. It encrypted users’ 몭les until they paid a ransom in BitCoins to get their data back. A botnet is a matrix of computers controlled by an attacker through malware installed on each computer. Combining these two has made it easy for criminals to wreak havoc online, earning them pro몭t at the cost of innocent users’ privacy and security. 3. Phishing ML-based spoof emails are more e몭ective and successful in stealing credentials. It is mainly because ML algorithms are reasonably successful in creating instant messages and emails that look like they are from trustworthy resources. 4. ML-based Password Generators Common passcode guesses include-123456789, date of birth, name of your close family members, etc. With most websites encouraging solid passwords, it has become a hard nut to crack the users’ passwords. However, ML-based algorithms have already been developed that guess passwords accurately. PassGan is a famous example of password guessing software using the ML algorithm for the job. So, we can expect more revolutionary password generators from hackers. Wrapping Up That was all about how Arti몭cial Intelligence and ML are in몭uencing the security of the digital world. Under the right hands, they are a boon to humanity, but they can quickly turn into a bane on the corrupt hands. As for now, upgrade your security with these technologies to stay in the competition. Connect with a Machine Learning company in India to maximize your cybersecurity. Categories: Blog • Enterprise Technology 749 views Varun Bhagat PixelCrayons Varun Bhagat is a technology geek and works as a Sr. IT Consultant with
  • 7.
    Varun Bhagat isa technology geek and works as a Sr. IT Consultant with PixelCrayons, a web & software development company in India.He possesses in-depth knowledge of mobile app development & web development technologies and helps clients to choose the best platforms as per their needs. Author Rank: 22 View All Posts » Join CustomerThink, get e-book The Top 5 Practices of Customer Experience Winners! New Editor's Picks My Customer is So Annoying! How to Rationally Decide if the Time Has Come to Sack Them Top 12 2022 B2B Marketing Trends to Watch When Customer Support is the only number Part I Selling to Named Accounts: A Working De몭nition of High, Wide, and Deep 5 Things IT Needs to Know About Product-Led Growth Strategies LEAVE A REPLY Comment: Name:* Email:* Website:  Notify me when new comments are added Save my name, email, and website in this browser for the next time I comment.
  • 8.
     Notify me whennew comments are added POST COMMENT New Posts My Customer is So Annoying! How to Rationally Decide if the Time Has Come... Colin Shaw - January 16, 2022 Why Every Website Should Have a Blog Uwe Dreissigacker - January 16, 2022 Don’t Leave Your Customers Stranded Jim Tincher - January 16, 2022 8 Tips to Design an Effective Landing Page Gloria Chow - January 16, 2022 Top 12 2022 B2B Marketing Trends to Watch Matt Heinz - January 16, 2022
  • 9.
    Trending Top 10 mostviewed posts published in last 30 days. 1. The Top 10 Google Algorithm Updates of 2021 [Infographic] 2. Customer Service from the Customer Side 3. 6 CX trends uprooting 2022 planning 4. 10 B2B Marketing Trends to Watch in 2022 5. 2022 Trends: Discover the Future of Call Centers 6. Customers Are Changing. Are You Ready with The Next Best Thing in Customer Strategy? 7. Potentially, How Will The Future Of Work And ‘The Great Resignation’ Impact Customer Experience? 8. B2B sales enablement trends 2022 – Becoming future 몭t 9. 3 Data Collection Trends Critical to Customer Retention in 2022 10. 2022 Will Change the Status Quo in Customer Experience. Here’s How
  • 10.
    Top 10 Authors 1.Steven Van Belleghem 2. Thomas Wieberneit 3. Lynn Hunsaker 4. Nikunj Gundaniya 5. Mitul Makadia 6. Liliana Petrova 7. Vivek Goel 8. Jitu Bhaskar 9. Dave Fish 10. Nicholas Zeisler See all ranked authors » Recent Comments Michael Lowenstein on My Customer is So Annoying! How to Rationally Decide if the Time Has Come to Sack Them
  • 11.
    Colin Shaw onCustomers Are Changing. Are You Ready with The Next Best Thing in Customer Strategy? Herbert Asuquo on Customers Are Changing. Are You Ready with The Next Best Thing in Customer Strategy? Vrushali Rao on 5 Ways to Boost Your Website’s Domain Authority Ankita Singh on To Apologize or Not To Apologize Sharon-Drew Morgen on Customer Service from the Customer Side Michael Lowenstein on Customer Service from the Customer Side Sharon-Drew Morgen on Customer Service from the Customer Side Michael Lowenstein on Customer Service from the Customer Side Vrushali Rao on How to Take Your Video Marketing Strategy to the Next Level Featured Marketplace Listings Best Practices to Prove the Business Value of Customer Experience Hooked On Customers: The Five Habits of Legendary Customer-Centric Companies Build everlasting customer relationships with the world's favorite CRM All Listings » MarketPlace Featured Listings Best Practices to Prove the Business Value of Customer Experience CustomerThink’s research 몭nds just 19% of CX initiatives can show tangible bene몭ts. Due to the COVID-19 crisis, the ROI issue is now front and center with CX leaders. Learn the best ways to prove the business value of CX, including ROI advice in customer feedback, customer service, and CX infrastructure. Hooked On Customers: The Five Habits of Legendary Customer-Centric Companies Combining his own professional experiences working as a CEO with his extensive research and expertise as an international authority on customer relationships, author Bob Thompson reveals the 몭ve routine organizational habits of successful customer-centric businesses: Listen, Think, Empower, Create, and Delight. Build everlasting customer relationships with the world's favorite CRM Connect with customers across channels using Zoho's omnichannel platform that integrates with 45+ apps & 500+ popular app extensions, including G-Suite, O몭ce 365, MailChimp, Zendesk & more. Get a 15-day FREE trial now!
  • 12.
    trial now! All Listings» ABOUT US CustomerThink is the world's largest online community dedicated to customer-centric business strategy. Join us, and you'll immediately receive the e-book The Top 5 Practices of Customer Experience Winners. Contact us: service@customerthink.com About Us Terms of Use Privacy Policy Advertise How to Contribute Join Log In © 1998-2022 CustomerThink Corp.