65% of Companies Don’t Monitor Employee Data Shared with Generative AI Tools

Sure! Here’s the translation of the provided text into American English:

The report “The State of Workforce Security: Key Insights for IT and Security Leaders” reveals the main security challenges, proposing strategies to mitigate emerging risks. The loss of visibility over corporate data and systems, combined with the rise of hybrid work and the increased use of personal devices, has left many companies vulnerable to cyber threats.

The report highlights how the browser has become the central point of daily work: more than 85% of business tasks are performed through it. However, this trend has broadened the attack surface, exposing organizations to risks such as phishing, ransomware, and browser-targeted attacks. This is why 95% of surveyed companies have experienced browser-based attacks, while 94% have been victims of phishing incidents in the past year.

Key Vulnerabilities in Workplace Security

The study highlights several critical factors impacting organizational security:

  • Expansion of BYOD and unmanaged devices: 98% of companies report policy violations related to the use of personal devices, and 53% admit they are unprepared to address these risks.
  • Accessing corporate data from personal devices: 90% of organizations allow some level of access, whether full or partial, to corporate data from personal devices, and 72% consider this a significant security risk.
  • Widespread use of unauthorized SaaS applications: Large organizations may have up to 10,000 SaaS applications in use, many of which lack approval from IT departments.
  • Encrypted traffic without inspection: 64% of encrypted traffic goes unnoticed, concealing potential threats like malware or data leaks.
  • Lack of control over generative AI tools: 65% of organizations lack visibility into the data shared in artificial intelligence applications, increasing the risk of information leakage and compliance issues.
  • Restrictions on mobile devices affecting productivity: 97% of organizations restrict access to corporate resources from BYOD devices, which, while mitigating risks, can create difficulties in daily operations.

SASE and Secure Browsers: The Key Combination for Effective Protection

The report emphasizes the adoption of Secure Access Service Edge (SASE) architectures, such as Prisma® SASE, along with secure browsers like Prisma Access Browser to strengthen protection.

  • Protection on BYOD and unmanaged devices: SASE enforces granular access policies, while secure browsers isolate BYOD environments, reducing the risk of data exposure without affecting productivity.
  • Risk reduction in SaaS and encrypted traffic: SASE integrates SWG, CASB, and ZTNA for a unified security model. Secure browsers extend control without the need for decryption.
  • Increased visibility and control: SASE inspects traffic and monitors the use of SaaS applications, while secure browsers enhance security with real-time visibility.
  • Protection against generative AI: These solutions prevent data exfiltration in unauthorized AI tools through advanced controls.
  • Safe and seamless experience: The integration of SASE and secure browsers allows for a protected work environment without impacting productivity.
Scroll to Top