IT disaster recovery, cloud computing and information security news

Imperva, Inc., is warning that the twin factors of poor data controls and the advent of new generative AI tools based on Large Language Models (LLMs) will lead to a spike in insider data breaches over the coming year. 

As LLM-powered chatbots have become more powerful, many organizations have implemented bans altogether or on what data can be shared with them. However, since an overwhelming majority (82 percent) have no insider risk management strategy in place, they remain blind to instances of employees using generative AI to help them with tasks like writing code or filling out requests for proposals (RFPs), despite the fact that this often involves employees giving unauthorized applications access to sensitive data stores.

“Forbidding employees from using generative AI is futile,” says Terry Ray, SVP, Data Security GTM and Field CTO, Imperva. “We’ve seen this with so many other technologies - people are inevitably able to find their way around such restrictions and so prohibitions just create an endless game of whack-a-mole for security teams, without keeping the enterprise meaningfully safer.” 

“People don’t need to have malicious intent to cause a data breach,” continued Ray. “Most of the time, they are just trying to be more efficient in doing their jobs. But if companies are blind to LLMs accessing their backend code or sensitive data stores, it’s just a matter of time before it blows up in their faces.”

Imperva says that rather than relying on employees to not use unauthorized tools, businesses need to focus on securing their data and ensuring they can answer key questions such as; who is accessing it, what, how, and from where. To this end, there are a number of steps that every organization, regardless of size, should be taking:

  • Visibility: It’s crucial for organizations to discover and have visibility over every data repository in their environment so that important information stored in shadow databases isn’t being forgotten or abused.
  • Classification: Once organizations have created an inventory of every data store in their environment, the next step is to classify every data asset according to type, sensitivity, and value to the organization. Effective data classification helps an organization understand the value of its data, whether the data is at risk, and which controls should be implemented to mitigate risks.
  • Monitoring and analytics: Businesses also need to implement data monitoring and analytics capabilities that can detect threats such as anomalous behavior, data exfiltration, privilege escalation, or suspicious account creation.

Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.