The Cybersecurity Risks Of Generative AI

We’re all still getting to grips with the exciting possibilities of generative AI as a technology that can create realistic and novel content, such as images, text, audio and video. Its use cases will span the enterprise, and include enhancing creativity, improving productivity, and generally helping people and businesses work more efficiently.

We are at a point of time in history where no other technology will transform how we work more drastically than AI is already doing.

However, generative AI also poses significant cybersecurity risks to your data. From seemingly innocuous prompts entered by users that may contain sensitive information (which the AI can then collect and store), to building large-scale malware campaigns, generative AI is nearly single-handedly expanding the ways in which sensitive information can be lost for modern enterprises.

For most LLM companies, they are just now starting to consider data security as part of their strategy and customer needs.

Businesses must adapt their security strategy to accommodate this, as generative AI security risks are revealing themselves as multi-faceted threats that stem from how users inside and out of the organisations interact with the tools. For many organizations, the risk is too high for them to allow generative AI tools into their organization and are seeking a secure path forward here.

What We Know So Far

Generative AI systems can collect, store, and process large amounts of data from various sources - including user prompts. This ties into the three primary risks facing organisations today:

Data Leaks:  If employees enter sensitive data into generative AI prompts, such as unreleased financial statements or intellectual property, then enterprises open themselves up to third-party risk akin to storing data on a file-sharing platform. Tools like ChatGPT or Copilot could also leak that proprietary data while answering prompts of users outside the organisation.

Malware Attacks:  Generative AI can generate new and complex types of malware that can evade conventional detection methods – and organisations may face a wave of new zero-day attacks because of this. Without purpose-built defence mechanisms in place to prevent them from being successful, IT teams will have a difficult time keeping pace with threat actors. Security solutions need to be using the same technologies at scale to keep up and stay ahead of these sophisticated attack methods.

Phishing Attacks:  The technology excels at creating convincing fake content that mimics real content but contains false or misleading information. This fake content can be used to trick users into revealing sensitive information or performing actions that compromise the security of the business. Threat actors can create new phishing campaigns – complete with believable stories, pictures and video – in minutes, and businesses will likely see a higher volume of phishing attempts because of this. Deep Fakes are being produced to spoof voices for targeted social engineering hacks and have proven to be very effective.

The three main security risks stemming from generative AI all follow one common thread: Data.

Whether it’s the accidental sharing of sensitive information or targeted efforts to steal it, AI is further amplifying the need for robust data security controls. 

Other Concerns  

Bias:  LLM’s can become biased in their responses and potentially give misleading or wrong information back out of models that were trained with bias information.

 Inaccuracies:  It has been seen that LLMs can accidently provide the wrong answer when analysing a question due to lack of human understanding and full context of a situation

Prioritizing Data Security Wherever Data Resides

Mitigating the security risks of generative AI broadly centres around three key pillars: employee awareness, security frameworks and technological solutions. 

Educating employees on the safe handling of sensitive information is nothing new. But the introduction of generative AI tools to the workforce demands consideration of the inevitable accompanying new data security threats. First, businesses must ensure employees understand what information can and can’t be shared with AI-powered solutions. Similarly, people should be made aware of the increase in malware and phishing campaigns that may result from generative AI.

The way businesses are operating is more complex than ever before - which is why securing data wherever it resides is a business imperative today.

Data is continuing to move from traditional on-premises locations to cloud environments, people are accessing data from anywhere, and keeping pace with various regulatory requirements is challenging. Traditional Data Loss Prevention (DLP) capabilities have been around forever and are super powerful for their intended use cases, but with data moving to the cloud, it is now clear that DLP capabilities also need to move while extending abilities and coverage. Organisations are now moving toward cloud-native DLP – prioritizing unified enforcement to extend data security across key channels. This approach streamlines out-of-the-box compliance and provides enterprises with industry-leading cybersecurity wherever data resides.

Leveraging Data Security Posture Management (DSPM) solutions allows for further protection for enterprises. AI-powered DSPM solutions enhance data security and protection by quickly and accurately identifying data risk, empowering decision-making by examining data content and context, and even remediating risks before they can be exploited. This prioritizes essential transparency about data storage, access and usage so that companies can assess their data security, identify vulnerabilities and initiate measures to reduce risk as efficiently as possible. 

Platforms that combine innovations like DSPM and DLP into a unified solution that prioritises data security everywhere are ideal – bridging security capabilities wherever data exists.

Successful implementation of generative AI can significantly boost an organisation’s performance and productivity; however, it is vital that companies are fully prepared for the cybersecurity threats such technologies can introduce to the workplace.

To best take advantage of exciting new tools while adequately protecting employees, organisations must prioritise security strategies that focus on protecting data wherever it resides with a strong focus on understanding their current data posture and the risks associated therein.

With this understanding, security practitioners will be empowered and able to take the necessary steps to reduce their risk posture quickly and accurately with minimal business impact.

Jaimen Hoopes is Vice President, Product Management at Forcepoint

Image: Allison Saeng

You Might Also Read:

What Can Be Done About Cyber Threat Actors Weaponizing AI?:

DIRECTORY OF SUPPLIERS - AI Security & Governance:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Hackers Target Healthcare
Securing The Supply Chain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

C3IA Solutions

C3IA Solutions

C3IA Solutions is an NCSC-certified Cyber Consultancy providing assured, tailored advice to keep your information secure and data protected.

Intertek Group

Intertek Group

Intertek Group provides Assurance, Testing, Inspection and Certification services. Activities include cybersecurity testing and certification.

Niksun

Niksun

Niksun's forensics-based cyber security and network performance monitoring products provide customers with actionable insight into security threats, performance issues, and compliance risks.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

VNT Software

VNT Software

VNT's vision is to change the way complex IT problems are resolved by predicting business disruptions before they occur.

CERT NZ

CERT NZ

CERT NZ supports businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice.

achelos

achelos

achelos is an independent software development company providing innovative technical solutions for micro-processor chips / security chips and embedded systems in security-critical application fields.

Passbase

Passbase

Passbase is building a full-stack identity verification engine backed by verified government documents.

Intrinium

Intrinium

Intrinium is an Information Technology and Security Solutions company, providing comprehensive consulting and managed services to businesses of all sizes.

BlackFog

BlackFog

BlackFog is a leader in device data privacy, data security and ransomware prevention. Our behavioral analysis and anti data exfiltration technology stops hackers before they even get started.

AccountabilIT

AccountabilIT

AccountabilIT is a full spectrum information technology services firm for enterprises with complex information technology needs seeking relief from those challenges.

Scybers

Scybers

Scybers are a global cybersecurity advisory and managed services company. With our deep expertise, we help our clients reduce their cyber risks with confidence.

BluSapphire

BluSapphire

BluSapphire is an industry-first, purpose-built, cloud-native, Hybrid XDR platform powered by AI and big data analytics.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.

Tranchulus

Tranchulus

Tranchulus are a global provider of offensive and defensive cyber solutions, information security assessment, compliance and managed security services.