Sun. Apr 21st, 2024

Despite the fact that it has been developing for many years, Artificial Intelligence has gained special prominence after the appearance of ChatGPT on the scene. The irruption of this generative artificial intelligence has made it possible for the general public to know the advantages that the use of AI can provide. However, its use from the equipment and terminals of the organizations can lead to an increase in the so-called Shadow IT. The well-known Shadow IT is one of the main problems faced by the cybersecurity department since it increases the risks to which they are exposed. exhibits a company This practice encompasses all Cloud programs and applications that are used in the workplace without the IT managers having approved their use. The main problem with using these applications is that it is the users themselves who are introducing security risks since they do not have the same level of protection as the other applications approved and controlled by the IT department. Among those unmanaged services is the hot app: ChatGPT.

The risks of ChatGPT

IT departments need to have complete visibility and control over the services they are using. This is a key element to guarantee the data of any organization. However, this whole series of new artificial intelligence cloud applications such as ChatGPT can lead to security breaches and the leakage of sensitive data. One of the main problems is that the use of these applications is not only in the interest of users, but in many cases it is the management committee itself that encourages its use without knowing the risks they face with its use. And it is that, to use ChatGPT and other similar tools, it is the users themselves who accept the risks to which they are exposed without even knowing what is done with the data that the user enters in the application or in which security gaps they are exposing to the company.

The use of ChatGPT from the computers and terminals of the organizations can lead to an increase in the so-called Shadow IT

To avoid these risks, it is the IT department that must assess the convenience of using the application. Only when a minimum of security has been applied to guarantee that data protection is correct is when users should use it on their professional computers or when accessing the organization’s network. Never before.

ensure control

In this sense, and not only for the use of ChatGPT, but for any unauthorized cloud application, the IT department must prevent unauthorized access to data and services. The use of a strategy based on the solutions included in the SSE model will prevent unauthorized access and control the information that users “upload” to this type of platform. This requires making the access control application as granular as possible and ensuring that security policies are consistently applied, not only to ChatGPT, but also to new AI solutions created.One such tool is Skyhigh Security’s Shadow IT functionality that proactively reviews 244 AI-related solutions to provide functional risk-based filters for each cloud service. In addition, it provides cybersecurity managers with prebuilt reports and dashboards that summarize cloud usage and risk across multiple dimensions. Thanks to this, highly customized reports can be created to highlight the risks of greatest concern and relevance to the organization, such as which collaboration applications in use are most at risk, etc.The solution also allows the creation of web access policies based on the Shadow IT risk assessment and with the option to apply different restrictions (for example, block access to all applications with high GDPR risk such as ChatGPT). It is a tool that offers the largest and most accurate cloud registry of more than 40,000 cloud services based on a detailed security evaluation in more than 75 objective criteria. These risk assessments become fundamental components for web and cloud governance policies. It should also be noted that the integration of Skyhigh Security’s Onprem/Cloud Proxy solutions allow you to establish detailed controls over Shadow IT, such as blocking file downloads when using a certain SaaS regardless of the user’s location. And finally, thanks to Skyhigh Security’s single console, we can manage all these solutions in a unified way, with global policies and DLP functionalities for each one of them. they.

By Alvaro Rivers

Award-winning student. Incurable social media fanatic. Music scholar. Beer maven. Writer.