Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » 89% of the use of Genai enterprises are invisible to organizations that expose critical safety risks, shows a new report
Global Security

89% of the use of Genai enterprises are invisible to organizations that expose critical safety risks, shows a new report

AdminBy AdminFebruary 27, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 27, 2025Hacker NewsArtificial Intelligence / Browser Security

Organizations are either already making Genai decisions, evaluating the strategies for integrating these instruments into their business plans, or both. For the management of informed decision-making and effective planning, the availability of rigid data is important-al-olive data remains surprisingly deficient.

“Report on Enterprise Genai data safety“By Layerx gives unprecedented ideas about the practical application of AI tools in the workplace, emphasizing critical vulnerabilities. Fighting the real world’s telemetry from Enterprise Layerx, this report is one of the few reliable sources in which the generation is in detail.

For example, this shows that almost 90% of the use of AI Enterprise occurs according to its visibility, subjected to significant risks such as data leaks and unauthorized access.

Below we bring some key conclusions of the report. Read the full report to clarify and improve your security strategies, decide on decision -making decisions, and evangelize resources to enhance Genai data protection.

Sign up for a webinar that will cover key findings in this report, Click here.

Use Genai in the enterprise no more (yet)

Although Genai’s excitement may seem that all the workforce has passed their office activities in Genai, Layerx finds the actual use of warmer. Approximately 15% of users gain access to Genai tools daily. It’s not a percentage to ignore, but it’s not most.

So far. Here, in the new stack, we agree with the Layerx analysis, predicting that this trend will quickly accelerate. Moreover, 50% of users currently use Genai every second week.

In addition, they find that 39% of ordinary Genai tools are software developers, which means that the highest data leak potential through Genai has a source and its own code, as well as the risk of using risky code in your base base.

How is Genai used? Who knows?

Because Layerx is located in the browser, the tool has the visibility of using Shadow Saas. This means that they can see employees who use tools that have not been approved by IT organization or through non-corporate accounts.

And although Genai tools such as Chatgpt are used for work purposes, almost 72% of employees gain access to their personal accounts. When employees make access through corporate accounts, only about 12% made from SSO. As a result, almost 90% of Genai use are invisible to the organization. This leaves the organizations blind for the “shadow AI” applications and the Corporate Corporate Information Information AI.

50% Intogenai Activities include corporate data

Remember the Pareta principle? In this case, although not all users use Genai daily, users engaged in the Genai app, do so often and potentially sensitive information.

Layerx has found that corporate data insertion is almost 4 times a day, on average, among users providing data into Genai tools. This may include business information, customer data, financial plans, source code, etc.

How to plan the use of Genai: What businesses should do now

The conclusions in the report signal the need for new security security strategies to manage Genai. Traditional safety tools cannot affect the modern AI workplace where the applications are based on the browser. They lack the opportunity to detect, manage AI’s interaction in the source – browser.

The browser’s safety based on AI SAAS applications, unknown AI applications outside Chatgot, AI extension and more. This visibility can be used to use DLP Solutions for Genai, allowing businesses to safely include Genai in their plans, providing the future business.

To access additional data on how Genai is used, read Full report.

Found this article interesting? This article is a contribution to one of our esteemed partners. Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.