Skip to main content
Image of a data centre

Does your business use Chat AI?

15th May 2024

20% of organisations admit that an employee at their organisation has exposed sensitive company information using AI tools such as ChatGPT, according to new research.

Where is the risk?

  • First, there is the risk of total reliance on the AI platform to have strong data privacy policies and robust security measures that cannot be breached.

  • Secondly, if the same AI platform account is being shared across a company - all those with access to it can read any/all previous enquiries.

Studies show that many security experts believe insider threats pose a more significant risk than external threats to an organisation’s cybersecurity. Employees can unintentionally (or intentionally) compromise a businesses IT security in a number of ways and this can result in data breaches, unauthorized access, and other security incidents. Here's how you can prevent or mitigate problems:

  1. Training and Education: Regularly educate employees about AI and cybersecurity best practices, as well as how to identify phishing attempts and other threats.

  2. Access Control: Implement proper access controls to limit employees' access to only the resources they need to perform their jobs.

  3. Strong Authentication: Enforce strong password policies, implement multi-factor authentication, and use biometric authentication where possible.

  4. Monitoring: Monitor network and system activities for unusual behavior that could indicate unauthorized access or data leakage.

  5. Data Loss Prevention: Use tools and policies to prevent accidental data leakage through email, cloud services, and other channels.

  6. Tag Devices: security/tracker tag all devices and limit the need, or ability, to remove devices from secure locations.

  7. Incident Response: Have a well-defined incident response plan in place to address security incidents promptly and effectively.

  8. Employee Engagement: Foster a positive work environment to reduce the likelihood of disgruntled employees and insider threats.

  9. Regular Auditing: Conduct regular security audits and assessments to identify vulnerabilities and address them promptly.

Click HERE to read our other helpful articles.

Back to top