Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Security isn’t convenient, and that’s a big problem in the age of AI

By Dana Simberkoff
Person tapping AI app on phone

Image via Unsplash

April 22, 2024

Security isn’t convenient. For most of us, traditional cybersecurity protocols like CAPTCHAs, two-factor authentication and passwords can feel like barriers that stand in the way of productivity. Whether that’s making a purchase, accessing workplace data or trying to log into an app that you were inadvertently kicked out of — we want what we want, we want it now and we often want it at the expense of our own data security and privacy. In fact, a surprising 29% of consumers have abandoned creating an online account due to too many security steps. 

At the same time, our digital world isn’t getting safer. While the rise of generative AI promises a transformation in productivity at work and at home, these tools are also enabling the evolution of the global threat landscape at a pace we never could have imagined. Without strong guardrails and stringent regulation, AI will facilitate increasingly advanced cyber threats that could have lasting societal implications across our economy, democracy and within our daily lives. Just recently, a Joe Biden deep fake told Democrats to stay home during the New Hampshire primary, and a finance employee in Hong Kong wired $25M to a fraudster that created a deep fake of their company’s CFO. 

With threats looming, here are three considerations for consumers and businesses to protect data privacy in the age of AI.

Data is a prized possession

A recent study from Pew Research Center found that 67% of U.S. adults don’t understand what companies are doing with their personal data. This is not acceptable. As individuals, we must be in the driver’s seat and take ownership of our data as it’s our most prized possession. That will likely require not only training and awareness, but also education and empowerment. The United States has historically lagged behind Europe when it comes to data privacy regulation, but individuals and organizations alike must push for federal standards surrounding trust and transparency in the coming years. With strong data privacy protections and a clear understanding of who owns and uses our data, we can develop trust in AI and work towards productive, powerful and ethical use of these tools.

Trust is the new currency

However, when it comes to AI, trust is difficult to assess. Do we trust the systems that we’re using when we turn over our data? Do we trust that AI systems are being used ethically and producing factual outputs? Are companies and governments responsible for negative consequences of AI deployment? These are questions that must be answered to establish true public trust in AI and to reap the many rewards this technology can deliver. Trust cannot be developed in a silo and will require collaboration from global leaders in intellectual property, data privacy, cybersecurity and antitrust law and policy, along with technologists in computer science, engineering and machine learning. 

AI will exploit every crack in the system 

AI is a powerful tool for society — and that includes the hackers that will use it to exploit every weakness and flaw in our global cybersecurity infrastructure. For example, AI models can be trained on malware to create code that can evade detection. As businesses rush AI deployment to power competitive strategy and productivity for employees and customers, the guardrails around data security and privacy must be strengthened. This means securing and encrypting data used to train AI and monitoring and auditing data quality regularly. We protect what we treasure and improve what we measure. Trustworthy AI-powered solutions must be built on a foundation of accurate, complete and consistent data.  Every business using or developing AI must be held to this standard, to ensure critical data is safeguarded from threat.

Although we’re still in the early innings of AI adoption, organizations (as well as employees, citizens and world leaders alike) must pay very close attention to the development and proliferation of this technology. In the coming years, AI has the potential to usher in a period of great transformation and convenience across every facet of our lives. With this, strict data security protocols and encryption, and establishing guardrails for trust in the technology, will be crucial to safe adoption and to protecting our privacy.   

KEYWORDS: Artificial Intelligence (AI) Security consumer sentiment consumer trust data privacy data protection

Share This Story

Dana Simberkoff is the Chief Risk, Privacy and Information Security Officer for AvePoint, Inc. She is responsible for executive level consulting, research and analytical support on current and upcoming industry trends, technology, standards, best practices, concepts and solutions for risk management and compliance. (e.g. Privacy, Information Security and Information Assurance, Data Governance, and Compliance).

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing