AI Adoption Surges But Security Awareness Lags Behind

A new ExtraHop survey involving over 1200 global security and IT leaders has provided fresh insights into the adoption and management of generative AI tools like ChatGPT and Google Bard. Security is reportedly not the primary concern for organizations using these tools; respondents are more worried about inaccurate responses than the exposure of customer and employee personally identifiable information, disclosure of trade secrets and financial loss. Basic security practices are lacking with 82% of respondents confident in their security stacks but less than half investing in technology to monitor generative AI use, exposing them to data loss risks. Only 46% have established security policies for data sharing. "Data privacy is a pivotal concern. Interaction with such models can inadvertently lead to the sharing or exposure of sensitive information. This necessitates robust data handling and processing frameworks to prevent data leaks and ensure privacy," warned Craig Jones, vice president of security operations at Ontinue. "Organizations need to rigorously assess and control how LLMs handle data, ensuring alignment with GDPR, HIPAA, CCPA, etc. This involves employing strong encryption, consent mechanisms and data anonymization techniques, alongside regular audits and updates to data handling practices to remain compliant." The ExtraHop report shows that despite 32% of organizations banning generative AI tools, only 5% report zero usage, indicating employees find ways around these bans, making data retrieval challenging. There's a strong desire for external guidance, with 74% planning to invest in generative AI protection and 60% believing that governments should establish clear AI regulations for businesses. More generally, the ExtraHop report shows that use of generative AI tools are growing. To ensure safe and productive usage, the firm recommended clear policies, monitoring tools and employee training. "The use of generative AI tools is ultimately still in its infancy, and there are still many questions that need to be addressed to help ensure data privacy is respected and organizations can remain compliant," commented John Allen, vice president of cyber risk & compliance at Darktrace. "We all have a role to play in better understanding the potential risks and ensuring that the right guardrails and policies are put in place to protect privacy and keep data secure."

This Cyber News was published on www.infosecurity-magazine.com. Publication date: Thu, 30 Nov 2023 23:19:27 +0000


Cyber News related to AI Adoption Surges But Security Awareness Lags Behind

Developing Cybersecurity Awareness Programs for Schools - Schools are increasingly becoming targets for cyberattacks, necessitating the development of robust cybersecurity awareness programs. Ultimately, a comprehensive cybersecurity awareness program is essential for schools to mitigate risks, enhance ...
1 year ago Securityzap.com
Cybersecurity Awareness Campaigns in Education - Cybersecurity awareness campaigns in education are essential to protect digital systems and information. The target audience for cybersecurity awareness campaigns in education includes students, teachers, administrators, and other staff members. ...
2 years ago Securityzap.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
5 months ago Cybersecuritynews.com
Cloud Security: Stats and Strategies - An interesting aspect in O'Reilly's latest Cloud Adoption report based on a global survey conducted is that 90% of the responders are using the cloud to support their business. One of the key takeaways from the State of the Cloud report from Flexera ...
1 year ago Feeds.dzone.com
How to Safeguard Your Data Through Security Awareness Training? - As cybercriminals employ increasingly advanced tactics, IT security awareness training becomes a pivotal defense mechanism. This article delves deeper into the imperative of such training and provides actionable tips to enhance the effectiveness of ...
1 year ago Cybersecurity-insiders.com
Before starting your 2024 security awareness program, ask these 10 questions - As Q1 of the new year blasts off, you might feel eager to jump into your 2024 security awareness program immediately. Knowing this will allow you to have these customized groups and targeted training ready in advance, so teams don't unknowingly start ...
1 year ago Securityboulevard.com
Understanding CAT Culture in Cybersecurity: Collaboration, Awareness, and Training - In the dynamic and ever-evolving landscape of cybersecurity, organizations are increasingly recognizing the importance of fostering a robust security culture to mitigate risks and safe-guard sensitive data. One such approach gaining traction is the ...
1 year ago Cybersecurity-insiders.com
ISB Cybersecurity Awareness Month: Expert Tips - Information Security Buzz spoke with several security experts and asked them, “What’s the one piece of advice that could make a difference?” Their responses highlight that cybersecurity is not one-size-fits-all—each organization must tailor ...
1 year ago Informationsecuritybuzz.com
Aim Security Raises $10M to Secure Generative AI Enterprise Adoption - PRESS RELEASE. TEL AVIV, Israel-(BUSINESS WIRE)-Aim Security, an Israeli cybersecurity startup offering enterprises a holistic, one-stop shop GenAI security platform, today announced $10 million in seed funding. Aim Security was founded by ...
1 year ago Darkreading.com
6 Best Security Awareness Training Platforms For MSPs in 2025 - More than 20,000 entities in over 50 countries have partnered with Wizer to offer security awareness training, recognizing that the platform is a modern alternative to traditional learning methods that can become outdated or boring. Additionally, ...
8 months ago Cybersecuritynews.com
AI Adoption Surges But Security Awareness Lags Behind - A new ExtraHop survey involving over 1200 global security and IT leaders has provided fresh insights into the adoption and management of generative AI tools like ChatGPT and Google Bard. Security is reportedly not the primary concern for ...
2 years ago Infosecurity-magazine.com
10 Best Anti-Phishing Tools in 2025 - What is Good?What Could Be Better?Real-time email threat detection and response using AI and machine learning.Limited customer support optionsAutomates incident response to stop phishing attacks quickly.The training module is not entirely ...
4 months ago Cybersecuritynews.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
2 years ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
2 years ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
2 years ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
2 years ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
2 years ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
2 years ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
2 years ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
2 years ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
2 years ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
2 years ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
2 years ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
2 years ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
2 years ago Cybersecurity-insiders.com