Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Small businesses need to secure data before tapping into AI

By Edward Tuorinsky
Woman at cash register

Image via Unsplash

August 20, 2024

AI is the acronym on everyone’s lips this summer. Generative AI tools have gone mainstream, and nearly everyone has heard an AI use case that piques their interest. But you’ve got questions about the cost, the security, and how to use your data because you’re a small business, not an enterprise with massive resources.

AI is a growth tool that can be a game-changer for smaller businesses. Using existing AI tools to automate and streamline processes is a force multiplier — freeing your employees to focus on more complex tasks. Being able to ask AI questions about your business holds limitless potential.

Even if your company hasn’t formally decided to embrace AI, your employees may be using it — 75% of all employees worldwide are, according to new data from a joint Microsoft and LinkedIn 2024 Work Trend Index. As a cybersecurity professional, when I read that, the first thing I worried about was data security.

Doing fundamental data governance can protect your intellectual property and your employees’ and customers’ data as you explore AI. 

Data governance 101

Data governance is part of your overall security posture, often as a component of cybersecurity or modernization. It’s the set of policies, procedures and practices for handling data within the organization. Data government ensures that your data is accurate, reliable and consistent — so it can be used for business decisions and initiatives.

Data governance is an important foundation for AI because it protects the data you consider proprietary and secures other corporate data that may be exposed by open AI tools, such as calendars or the text from your latest proposal.

The process for data governance can be broken down into three steps: organize, cleanse and protect. A deeper dive into each step can help you understand what kind of resources and time will be needed to get the AI outcomes you desire.

Organize your data

Depending on your organization, you could be looking at massive amounts of data stretching back decades or more modest databases and files. So, before the data is analyzed or used, an important first step is to understand what you have and determine if it’s valuable. Certain tools can help you apply data governance by mapping your data landscape and automating tagging data to help classify it. 

Organizing can help you determine how to store data, too. For example, you might have data related to your company holiday party and summer picnic. It’s important to keep but likely won’t be part of your AI efforts, so you might tag it and decide to archive it.

Cleanse your data

High-quality, clean data is the basis of accurate analytics. Your company will need it to derive meaningful insights or make data-driven decisions. Without data cleansing, your business risks using results based on inaccurate or misleading data, with potentially detrimental outcomes.

Data cleansing involves reviewing and removing inaccurate, incomplete or irrelevant data from your datasets. Data can become inaccurate over time as businesses acquire customer and prospect data with errors, duplications, or incomplete information from human error, formatting issues, and processing errors.

The data cleansing process can be different depending on the dataset but may involve removing duplicate and irrelevant data, correcting formatting and validating data. For this step, it may help to consult with an AI practitioner or data cleansing service provider. They can also assist you in determining what data to cleanse based on the AI use cases you have in mind.

Protect your data

You lock your car doors, put your money in a bank and store valuables in a safe. Protecting your data — your company’s intellectual property — demands the same security mindset. In many cases, the data you have may be that of your customers, who trust you to be stewards of their information. 

Consider how data collection practices have escalated: Many companies now use software to track every action a user takes and collect information submitted through forms — including intellectual property, data from cookies, IP addresses and device IDs. Personal data that is collected and used to train AI becomes part of the AI model, meaning there’s no way to track it or undo it.

Protecting data may involve moving data to a more secure location, isolating data that will be used for AI and encrypting data. Some AI models will spell out requirements for security. Small companies want to read that fine print to make sure their data is retained in their environment and can’t be used to develop other models or used collectively.

Implementing AI

I recommend that small companies look to industry leaders for their data governance steps or build the process into their larger cybersecurity efforts. Companies like Microsoft and Google have invested in making the process easier with tools and services that accelerate the prep and get you to AI results sooner. 

Once organized, cleansed and secure, what can you expect from AI? Measurable gains in:

  1. Productivity, by streamlining tasks, facilitating communication, or accelerating service delivery,
  2. Optimized operations, with greater efficiency at every level and relief from digital overload,
  3. And business outcomes, using your data to identify trends, see opportunities, make decisions, or answer questions. 

And since we’re talking data, it might help to look at expected AI results in terms of numbers from a Work Trend Index Special Report on productivity, creativity and time:

  • 70% of AI users said they were more productive
  • 29% faster overall in a series of tasks (searching, writing, and summarizing)
  • Nearly 4x faster catching up on a missed meeting
  • Users saved 90 minutes on tasks/week

AI isn’t just for enterprises. It’s accessible and realistic for small companies to use too — if you first take the time to do proper data governance.

KEYWORDS: artificial intelligence (AI) Artificial Intelligence (AI) Security data management data protection small business security

Share This Story

Ed tuorinsky headshot

Edward Tuorinsky, Founder and Managing Principal of DTS, a government and commercial consultant business, is a Service-Disabled Veteran with nearly two decades of experience in management consulting and information technology services. Image courtesy of Tuorinsky

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!