{"id":1988,"date":"2025-02-19T12:08:00","date_gmt":"2025-02-19T12:08:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=1988"},"modified":"2025-02-19T12:08:00","modified_gmt":"2025-02-19T12:08:00","slug":"how-to-prevent-ai-based-data-incidents","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=1988","title":{"rendered":"How to prevent AI-based data incidents"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>It\u2019s every company\u2019s nightmare: A competitor is targeting its own customers with targeted campaigns. And it\u2019s doing it so precisely that it can\u2019t be a coincidence. It\u2019s reasonable to assume that the competitor has somehow gained access to this sensitive data.<\/p>\n<p>The source of the data breach: a former employee used an AI assistant to access an internal database full of account data. He then copied sensitive details such as customer sales and product usage. He then took them to his new employer.<\/p>\n<p>This example illustrates a rapidly growing problem: the rapidly increasing use of generative AI tools will inevitably lead to more data breaches. According to a recent Gartner survey, the most common AI use cases include GenAI-based applications such as Microsoft 365 Copilot and Salesforce. While these tools are an excellent way for companies to increase productivity, they also pose a major challenge for data security.<\/p>\n<h2 class=\"wp-block-heading\">Data risks<\/h2>\n<p>Research shows that almost 99 percent of authorizations are not used, with more than half of them being high-risk. In principle, unused and overly broad access rights are a problem for data security. Artificial intelligence exacerbates the situation many times over. When a user asks an AI assistant a question, the tool formulates an answer in natural language based on internet content and company data using graph technology. For example, Microsoft Copilot can access all the data that the user can access \u2013 even if the user is not even aware that they have access to it. Accordingly, Copilot can easily disclose sensitive data.<\/p>\n<h2 class=\"wp-block-heading\">AI lowers the barriers for attackers<\/h2>\n<p>AI has made the days when attackers had to \u201chack\u201d systems and slowly and carefully scout out the environment a thing of the past. Now they can simply ask an AI assistant for sensitive information or access data to move laterally within the environment.<\/p>\n<p>The biggest challenges for cybersecurity posed by AI are:<\/p>\n<p>Employees have access to too much data<\/p>\n<p>Sensitive data is often not marked or is marked incorrectly<\/p>\n<p>Insiders can quickly find and exfiltrate data using natural language<\/p>\n<p>Attackers can find secrets for privilege escalation and lateral movement<\/p>\n<p>It\u2019s impossible to manually set the right level of access<\/p>\n<p>GenAI quickly generates new sensitive data<\/p>\n<p>These data security challenges are not new. However, the speed and ease with which AI can expose information to attackers makes them easier than ever to exploit.<\/p>\n<h2 class=\"wp-block-heading\">Protective measures against the AI risk<\/h2>\n<p>The first step in eliminating the risks associated with AI is ensuring the homework has been done. Before using tools as powerful as Copilot, CISOs need to know where all their sensitive data is located. They also need to be able to analyze threats and risks, close security gaps, and efficiently fix misconfigurations.<\/p>\n<p>Only when CISOs have a firm grip on data security in their environment and the right processes are in place is the company ready to introduce AI assistants. Even after installation, security managers should continuously monitor the following three areas:<\/p>\n<p><strong>Access rights.<\/strong> It\u2019s important to ensure that employee permissions are properly sized and that the AI tool\u2019s access matches those permissions.<\/p>\n<p><strong>Classification.<\/strong> As soon as CISOs know what sensitive data the company has, they can label it to effectively enforce DLP rules.<\/p>\n<p><strong>Human activity.<\/strong> The use of AI assistants must be monitored and any suspicious behavior detected. Analyzing the prompts and the files that are accessed is crucial to prevent the misuse of artificial intelligence.<\/p>\n<p><em>Volker Sommer has worked in the software sector for more than 25 years \u2013 the last eight of which have been in cybersecurity. Since early 2024, he has been responsible for the German-speaking region and eastern Europe as regional sales director at Varonis Systems. Previously, he worked for VMWare\/Carbon Black, Sailpoint and Palo Alto Networks, among others.<\/em><\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>It\u2019s every company\u2019s nightmare: A competitor is targeting its own customers with targeted campaigns. And it\u2019s doing it so precisely that it can\u2019t be a coincidence. It\u2019s reasonable to assume that the competitor has somehow gained access to this sensitive data. The source of the data breach: a former employee used an AI assistant to [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":1989,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1988","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1988"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1988"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1988\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/1989"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}