Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Security isn’t convenient, and that’s a big problem in the age of AI

By Dana Simberkoff
Person tapping AI app on phone

Image via Unsplash

April 22, 2024

Security isn’t convenient. For most of us, traditional cybersecurity protocols like CAPTCHAs, two-factor authentication and passwords can feel like barriers that stand in the way of productivity. Whether that’s making a purchase, accessing workplace data or trying to log into an app that you were inadvertently kicked out of — we want what we want, we want it now and we often want it at the expense of our own data security and privacy. In fact, a surprising 29% of consumers have abandoned creating an online account due to too many security steps. 

At the same time, our digital world isn’t getting safer. While the rise of generative AI promises a transformation in productivity at work and at home, these tools are also enabling the evolution of the global threat landscape at a pace we never could have imagined. Without strong guardrails and stringent regulation, AI will facilitate increasingly advanced cyber threats that could have lasting societal implications across our economy, democracy and within our daily lives. Just recently, a Joe Biden deep fake told Democrats to stay home during the New Hampshire primary, and a finance employee in Hong Kong wired $25M to a fraudster that created a deep fake of their company’s CFO. 

With threats looming, here are three considerations for consumers and businesses to protect data privacy in the age of AI.

Data is a prized possession

A recent study from Pew Research Center found that 67% of U.S. adults don’t understand what companies are doing with their personal data. This is not acceptable. As individuals, we must be in the driver’s seat and take ownership of our data as it’s our most prized possession. That will likely require not only training and awareness, but also education and empowerment. The United States has historically lagged behind Europe when it comes to data privacy regulation, but individuals and organizations alike must push for federal standards surrounding trust and transparency in the coming years. With strong data privacy protections and a clear understanding of who owns and uses our data, we can develop trust in AI and work towards productive, powerful and ethical use of these tools.

Trust is the new currency

However, when it comes to AI, trust is difficult to assess. Do we trust the systems that we’re using when we turn over our data? Do we trust that AI systems are being used ethically and producing factual outputs? Are companies and governments responsible for negative consequences of AI deployment? These are questions that must be answered to establish true public trust in AI and to reap the many rewards this technology can deliver. Trust cannot be developed in a silo and will require collaboration from global leaders in intellectual property, data privacy, cybersecurity and antitrust law and policy, along with technologists in computer science, engineering and machine learning. 

AI will exploit every crack in the system 

AI is a powerful tool for society — and that includes the hackers that will use it to exploit every weakness and flaw in our global cybersecurity infrastructure. For example, AI models can be trained on malware to create code that can evade detection. As businesses rush AI deployment to power competitive strategy and productivity for employees and customers, the guardrails around data security and privacy must be strengthened. This means securing and encrypting data used to train AI and monitoring and auditing data quality regularly. We protect what we treasure and improve what we measure. Trustworthy AI-powered solutions must be built on a foundation of accurate, complete and consistent data.  Every business using or developing AI must be held to this standard, to ensure critical data is safeguarded from threat.

Although we’re still in the early innings of AI adoption, organizations (as well as employees, citizens and world leaders alike) must pay very close attention to the development and proliferation of this technology. In the coming years, AI has the potential to usher in a period of great transformation and convenience across every facet of our lives. With this, strict data security protocols and encryption, and establishing guardrails for trust in the technology, will be crucial to safe adoption and to protecting our privacy.   

KEYWORDS: Artificial Intelligence (AI) Security consumer sentiment consumer trust data privacy data protection

Share This Story

Dana Simberkoff is the Chief Risk, Privacy and Information Security Officer for AvePoint, Inc. She is responsible for executive level consulting, research and analytical support on current and upcoming industry trends, technology, standards, best practices, concepts and solutions for risk management and compliance. (e.g. Privacy, Information Security and Information Assurance, Data Governance, and Compliance).

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing