Victoria (VIC) Sun
  • Home
  • Politics
  • Market
  • Finance
  • Investing
  • World
  • Technology
  • Health
No Result
View All Result
Victoria (VIC) Sun
  • Home
  • Politics
  • Market
  • Finance
  • Investing
  • World
  • Technology
  • Health
No Result
View All Result
Victoria (VIC) Sun
No Result
View All Result
Home Technology

The advent of artificial intelligence systems increases the risk of data leaks

November 26, 2025
in Technology

You might also like

Astronomers have found an atmosphere on an ancient super-Earth with a magma ocean

800 kg helicopter tested in China

Samsung will make its smartphones worse because of Apple

More than half of Russian companies are concerned about data leaks due to artificial intelligence (AI) applications. Automation increases the risk of compromising both personal information and trade secrets. Experts point out that without data encryption, the leak may be irreversible.

The advent of artificial intelligence systems increases the risk of data leaks

According to a study by MTS Web Services, 59% of companies consider the threat of personal data leakage to be the most serious. Second is the risk of leaking commercial secret data, noted by 56% of businesses. When scaling AI solutions, IT departments place security concerns above the anticipated benefits of streamlining routine tasks and increasing the efficiency of business processes with AI.

At the same time, according to McKinsey, the level of AI system deployment in the world is 88%. Synthetic neural networks are actively used in the field of marketing as well as in the development of IT solutions.

Sergey Yudin, head of Content AI technology, said the high risk of data leakage when using neural networks is due to the nature of this technology. While classical software only processes data without storing or analyzing it beyond a specific task, AI systems are built on large language models that literally “absorb” information and use it to understand context internally. And in the case of public service – for additional training.

“The problem is, once in an open AI system, information cannot actually be deleted. It can be stored in logs, used in training samples, or accidentally disclosed to third parties. As a result, the leak becomes irreparable,” Yudin explains.

In this case, an important step to protect data is to create an internal policy for the use of AI. Employees need to be trained on what data is allowed to be transmitted to the neural network and what data is strictly prohibited.

For example, public AI services often make no secret that they save conversation history and use it to improve models. Even if data is aggregated anonymously, there is still a risk of unauthorized reproduction or access. Therefore, when introducing AI systems into their operations, companies will create an overall strategy for safely interacting with technology.

“One of the recommended techniques to protect data is to use 'placeholders', when fictitious ones are used instead of real names, amounts, bank details or company names. This allows you to maintain the logic and structure of the task and get relevant answers from the AI ​​without the risk of revealing confidential information,” says Yudin.

Required security measures also include privacy settings in the services used: disabling the option to allow the use of conversations for model training, regularly deleting correspondence history, and separating accounts for personal and work tasks.

Solar Group's press agency said that a large amount of data from enterprise systems of government and commercial organizations is loaded into the neural network. These can be files containing both general information about the company and sensitive data: for example, equipment drawings with detailed calculations or proprietary financial indicators. To safely implement AI into their operations, companies can use a variety of solution sets.

“In the future, we can see that AI technology will be used in information security products to automate processes and repel cyber attacks. This is because attackers are already using various AI tools to invade infrastructure. It turns out that AI will fight against itself,” the company concluded.

Recommended For You

Astronomers have found an atmosphere on an ancient super-Earth with a magma ocean

December 13, 2025
Astronomers have found an atmosphere on an ancient super-Earth with a magma ocean

Astronomers at the Carnegie Endowment have found convincing evidence for an atmosphere on a rocky planet outside our solar system. The results are published at Astrophysical Journal Letters....

Read more

800 kg helicopter tested in China

December 12, 2025
800 kg helicopter tested in China

China Aviation Industry Corporation (AVIC) tested the 800 kg AR-E800 six-blade helicopter. This was reported by the Chinese Army's Telegram channel. The test flight took place at Jingdezhen...

Read more

Samsung will make its smartphones worse because of Apple

December 12, 2025
Samsung will make its smartphones worse because of Apple

Samsung has refused to introduce new features into its smartphones due to competition with Apple. About this report Korean version of The Elec. Sources say that the IT...

Read more

Why does caffeine withdrawal cause headaches?

December 12, 2025
Why does caffeine withdrawal cause headaches?

Millions of people start their day with a cup of coffee, but as soon as they give up this habit, terrible headaches begin to haunt them. And this...

Read more

Archaeologists find a 1,400-year-old cubic skull: 'Intentional deformation'

December 12, 2025
Archaeologists find a 1,400-year-old cubic skull: 'Intentional deformation'

An unusually blocky human skull was discovered at a Mesoamerican site in the state of Tamaulipas (Mexico). Metro reports this. The area was inhabited by various Mesoamerican ethnic...

Read more
Next Post
Plot against Zelensky: a political coup is being prepared in Kiev

Plot against Zelensky: a political coup is being prepared in Kiev

Related News

The provision for using Russian assets for recovery has disappeared from the plan for Ukraine.

November 25, 2025
IPhone users complain about not working online in iOS 26

IPhone users complain about not working online in iOS 26

September 27, 2025
Tsarev explains the importance of looking at Mindich's “Zelensky wallet.”

Tsarev explains the importance of looking at Mindich's “Zelensky wallet.”

November 12, 2025
The plane collapsed to the ocean near the beach in the United States

The plane collapsed to the ocean near the beach in the United States

August 4, 2025
Who can become the new president of Ukraine

Who can become the new president of Ukraine

December 10, 2025
Blatant violations in the dining room What is known about the poisoning of students in St. Petersburg

Blatant violations in the dining room What is known about the poisoning of students in St. Petersburg

October 31, 2025
Expert explains how technology collection will change electronics prices by 2026

Expert explains how technology collection will change electronics prices by 2026

November 12, 2025
Trump's military pay decision is called a “dangerous precedent”

Trump's military pay decision is called a “dangerous precedent”

October 27, 2025
Palestinian support in Milan ended with police clashes

Palestinian support in Milan ended with police clashes

September 23, 2025
  • Politics
  • World
  • Investing
  • Finance
  • Technology
  • Health
  • Market
  • Press release

© 2025 Victoria Sun

No Result
View All Result
  • Home
  • Politics
  • Finance
  • Health
  • Investing
  • Market
  • Technology
  • World
  • Press release

© 2025 Victoria Sun

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?