The Cybersecurity Risks Of Generative AI

We’re all still getting to grips with the exciting possibilities of generative AI as a technology that can create realistic and novel content, such as images, text, audio and video. Its use cases will span the enterprise, and include enhancing creativity, improving productivity, and generally helping people and businesses work more efficiently.

We are at a point of time in history where no other technology will transform how we work more drastically than AI is already doing.

However, generative AI also poses significant cybersecurity risks to your data. From seemingly innocuous prompts entered by users that may contain sensitive information (which the AI can then collect and store), to building large-scale malware campaigns, generative AI is nearly single-handedly expanding the ways in which sensitive information can be lost for modern enterprises.

For most LLM companies, they are just now starting to consider data security as part of their strategy and customer needs.

Businesses must adapt their security strategy to accommodate this, as generative AI security risks are revealing themselves as multi-faceted threats that stem from how users inside and out of the organisations interact with the tools. For many organizations, the risk is too high for them to allow generative AI tools into their organization and are seeking a secure path forward here.

What We Know So Far

Generative AI systems can collect, store, and process large amounts of data from various sources - including user prompts. This ties into the three primary risks facing organisations today:

Data Leaks:  If employees enter sensitive data into generative AI prompts, such as unreleased financial statements or intellectual property, then enterprises open themselves up to third-party risk akin to storing data on a file-sharing platform. Tools like ChatGPT or Copilot could also leak that proprietary data while answering prompts of users outside the organisation.

Malware Attacks:  Generative AI can generate new and complex types of malware that can evade conventional detection methods – and organisations may face a wave of new zero-day attacks because of this. Without purpose-built defence mechanisms in place to prevent them from being successful, IT teams will have a difficult time keeping pace with threat actors. Security solutions need to be using the same technologies at scale to keep up and stay ahead of these sophisticated attack methods.

Phishing Attacks:  The technology excels at creating convincing fake content that mimics real content but contains false or misleading information. This fake content can be used to trick users into revealing sensitive information or performing actions that compromise the security of the business. Threat actors can create new phishing campaigns – complete with believable stories, pictures and video – in minutes, and businesses will likely see a higher volume of phishing attempts because of this. Deep Fakes are being produced to spoof voices for targeted social engineering hacks and have proven to be very effective.

The three main security risks stemming from generative AI all follow one common thread: Data.

Whether it’s the accidental sharing of sensitive information or targeted efforts to steal it, AI is further amplifying the need for robust data security controls. 

Other Concerns  

Bias:  LLM’s can become biased in their responses and potentially give misleading or wrong information back out of models that were trained with bias information.

 Inaccuracies:  It has been seen that LLMs can accidently provide the wrong answer when analysing a question due to lack of human understanding and full context of a situation

Prioritizing Data Security Wherever Data Resides

Mitigating the security risks of generative AI broadly centres around three key pillars: employee awareness, security frameworks and technological solutions. 

Educating employees on the safe handling of sensitive information is nothing new. But the introduction of generative AI tools to the workforce demands consideration of the inevitable accompanying new data security threats. First, businesses must ensure employees understand what information can and can’t be shared with AI-powered solutions. Similarly, people should be made aware of the increase in malware and phishing campaigns that may result from generative AI.

The way businesses are operating is more complex than ever before - which is why securing data wherever it resides is a business imperative today.

Data is continuing to move from traditional on-premises locations to cloud environments, people are accessing data from anywhere, and keeping pace with various regulatory requirements is challenging. Traditional Data Loss Prevention (DLP) capabilities have been around forever and are super powerful for their intended use cases, but with data moving to the cloud, it is now clear that DLP capabilities also need to move while extending abilities and coverage. Organisations are now moving toward cloud-native DLP – prioritizing unified enforcement to extend data security across key channels. This approach streamlines out-of-the-box compliance and provides enterprises with industry-leading cybersecurity wherever data resides.

Leveraging Data Security Posture Management (DSPM) solutions allows for further protection for enterprises. AI-powered DSPM solutions enhance data security and protection by quickly and accurately identifying data risk, empowering decision-making by examining data content and context, and even remediating risks before they can be exploited. This prioritizes essential transparency about data storage, access and usage so that companies can assess their data security, identify vulnerabilities and initiate measures to reduce risk as efficiently as possible. 

Platforms that combine innovations like DSPM and DLP into a unified solution that prioritises data security everywhere are ideal – bridging security capabilities wherever data exists.

Successful implementation of generative AI can significantly boost an organisation’s performance and productivity; however, it is vital that companies are fully prepared for the cybersecurity threats such technologies can introduce to the workplace.

To best take advantage of exciting new tools while adequately protecting employees, organisations must prioritise security strategies that focus on protecting data wherever it resides with a strong focus on understanding their current data posture and the risks associated therein.

With this understanding, security practitioners will be empowered and able to take the necessary steps to reduce their risk posture quickly and accurately with minimal business impact.

Jaimen Hoopes is Vice President, Product Management at Forcepoint

Image: Allison Saeng

You Might Also Read:

What Can Be Done About Cyber Threat Actors Weaponizing AI?:

DIRECTORY OF SUPPLIERS - AI Security & Governance:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Hackers Target Healthcare
Securing The Supply Chain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

Lanner Electronics

Lanner Electronics

Lanner Electronics is a leading hardware provider for advanced network appliances and industrial automation solutions including cyber security.

Salient CRGT

Salient CRGT

Salient CRGT is a leading provider of health, data analytics, cloud, agile software development, mobility, cyber security, and infrastructure solutions.

Guardian Data Destruction

Guardian Data Destruction

Guardian Data Destruction provides a comprehensive suite of onsite e-data destruction services.

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada.

LevelOps

LevelOps

LevelOps is an industry application security platform that tracks and develops your application security.

Envelop Risk

Envelop Risk

Envelop Risk is a global specialty cyber insurance firm, combining decades of insurance industry expertise with sophisticated cyber and artificial intelligence-based analytics.

Broadcom

Broadcom

Broadcom is a global technology leader that designs, develops and supplies a broad range of semiconductor and infrastructure software solutions.

Active Countermeasures

Active Countermeasures

Active Countermeasures believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable commercial tools.

Realsec

Realsec

RealSec is an international company and is a developer of encryption and digital signature systems and Blockchain for the Banking and Methods of Payment sectors, Government and Defense and Multisector

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

Salem Cyber

Salem Cyber

Salem Cyber builds Artificial Intelligence (AI) solutions that work collaboratively with people to address scalability challenges in cybersecurity operations.

O'Reilly Media

O'Reilly Media

O’Reilly’s help professionals learn best practices and discover emerging trends that will shape the future of the tech industry.

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center is a state-of-the-art facility to deliver advanced cyber training programs and build the next generation of Azerbaijan’s cybersecurity professionals.

NewsGuard Technologies

NewsGuard Technologies

NewsGuard provides transparent tools to counter misinformation for readers, brands, and democracies.

STACK Cybersecurity

STACK Cybersecurity

STACK Cybersecurity serves as a strategic partner, guiding you through the intricate and dynamic cybersecurity landscape.