Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business ResilienceSecurity Education & Training

Rushing into generative AI is risky: How to protect data

By Dale “Dr. Z” Zabriskie
ChatGPT on computer

Image via Unsplash

June 13, 2023

Everyday business users are experimenting with ChatGPT and other generative AI tools. In fact, Gartner predicts that by 2025, 30% of marketing content will be created by generative AI and augmented by humans. Companies like Samsung, however, have discovered the hard way that users who don’t understand the risks of the new technology are becoming unwitting insider threats. Thus, rushing ahead without building guardrails could result in data breaches and other security events. 

There’s no doubt that generative AI will be a useful tool for businesses, but it requires careful implementation. As unstructured data proliferates and is incorporated into new algorithms and the apps using them, it’s imperative that businesses establish a strategy for responsible AI use and data protection that can withstand this new age. 

The insider threat is bigger than ever

The Samsung data leak is not an isolated incident. Research from the 2022 Ponemon Institute shows insider threat incidents have risen 44% in the last two years. While there will always be some level of human error, this unprecedented level of risk can be mitigated. Many CIOs have been reluctant to put rules around generative AI, concerned that employees will feel untrusted; however, a lenient approach will leave organizations vulnerable to exposure. 

Ultimately, IT needs to create a balance between giving employees access to the tools and data they need, and the chance that people will make mistakes. Human error is one of the biggest security risks of all. The best way to protect data is to ensure all users feel responsible and know how to do so. 

Companies should train employees — based on their roles and levels of access — to be data stewards. CMOs, developers, database administrators, and HR associates will all have different relationships to the data they work with. Each employee needs to understand what risk they pose and how to better protect data. If we’re all active citizens within our communities, following regulations like traffic laws to ensure safety, employees need to be doing the same — bringing a data security and safety attitude to everything they do.   

Rooting out shadow IT

In some organizations, generative AI might be only one of the myriad applications with data flowing in and out that IT should monitor but doesn’t always have full visibility into. The reality is there’s a “shadow IT” apparatus in most companies, which allows unstructured data to pass through IT landscapes, unaccounted for and unprotected. Shockingly, Quest Software research discovered that 42% of IT leaders say that at least half of their data is in the shadows, meaning it cannot be located, managed, or secured.

Employees using unsanctioned apps, like generative AI tools, may unknowingly add rogue IT and dark data assets, creating a scenario where businesses lack the insight to prevent unintentional data breaches. Access to data and apps is still very important, but ensuring that proper visibility is in place for these assets — and that access is managed carefully — can help businesses maintain a balance. 

This can be done on a few different levels:

  • Access privileges: IT departments should regularly update and monitor who really needs access to a dataset or application and make updates when roles or employment status changes. 
  • Preventing data scraping: Generative AI tools are trained on internet data. If an employee drops sensitive company data into a chatbot, it could expose the information and it inadvertently becomes part of the public domain. Vendors like OpenAI and Anthropic are working to put privacy controls into place, but businesses should not wait nor rely on outsiders to protect their assets. They need to create their own controls.
  • Active observability: Regular scanning of data environments will enable greater understanding of threats from discovering shadow data and third-party apps to gauging how data flows across the organization. For example, IT professionals can catch when an overexcited employee is putting data into a third-party extension, such as SlackGPT, and take steps to both remedy third-party access and educate that employee about their role in data protection.

An organization-wide effort

The best way to prevent proprietary data leaks stemming from generative AI is with responsible AI use. Implementing an intentional data strategy that balances security and access is imperative for every organization. 

Businesses can protect themselves from today’s security threats while taking advantage of the best aspects of AI, but only as data security becomes a priority: a coordinated effort that includes technical guardrails and processes for accountability but also tailored employee education throughout the entire organization. Only then will businesses be truly protected against today’s security threats while being able to take advantage of the best aspects of AI.

KEYWORDS: Artificial Intelligence (AI) Security data security data storage database IT IT management IT security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dr. z headshot

Dale “Dr. Z” Zabriskie is Field CISO at Cohesity. Image courtesy of Zabriskie

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0219-data-Feat-slide1_900px

    How to protect ERP data when access to corporate networks is both ubiquitous and for sale on the dark web

    See More
  • Woman at cash register

    Small businesses need to secure data before tapping into AI

    See More
  • Phone home screen with 20 AI applications

    Breaking bad: How bad actors can corrupt the morals of generative AI

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing