Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw

November 1, 2025

Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms

November 1, 2025

Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

November 1, 2025
Facebook X (Twitter) Instagram
Saturday, November 1
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»One In Four Employees Use Unapproved AI Tools, Research Finds
News

One In Four Employees Use Unapproved AI Tools, Research Finds

Team-CWDBy Team-CWDOctober 30, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Shadow AI is emerging as one of the top forms of shadow IT, a new 1Password report has revealed.

The unauthorized use of AI tools was found to be the second-most prevalent form of shadow IT, ranking only behind email, according to 1Password’s 2025 Annual Report, published on October 30.

Overall, workers are broadly encouraged by their company to use AI as part of their workloads and the 1Password report found that of 5000 workers surveyed 73% said their company is in favor of such experimentation.

However, 37% admitted they do not always follow their company’s AI policies when using AI tools. Worse, 27% of employees recognized having worked with AI tools that had not been authorized by their company.

This number is still much lower than general shadow IT, the report said, with 52% of employees admitting they have downloaded apps without IT approval.

Shadow AI has been  described by 1Password as an even more pervasive practice than general shadow IT as these tools “can absorb sensitive information into their training data, violate legal and compliance mandates or function as outright malware.”

Read now: Why Shadow AI Is the Next Big Governance Challenge for CISOs

Generative AI Fuels Innovation Appetite

Speaking at a CISO roundtable during a launch event for the 1Password report, Mark Hazleton, CSO for Formula One racing team Oracle Red Bull Racing, explained the rise of shadow AI was partly due to productivity gains being a top priority for most employee when adopting new tools.

He said that workers are “focused on getting the job done, so if we try and restrain them, they will find a way to do what they need to do.”

“In F1, if somebody comes up on a Saturday night with a mechanism that’s going to save a second in the race on Sunday, we want to enable them to go forward with it,” he said.

The 1Password report found almost half of respondents justified their ‘shadowy’ use of AI tools because of their convenience (45%) and almost as many said they feel more productive when using AI (43%).

Breakdown of reasons to use AI without IT approval recorded in the 1Password 2025 Annual Report. Source: 1Password

Hazleton also noted that the emergence of generative AI tools has ignited an unheard-of appetite for innovation within the workforce.

Susan Chiang, CISO at healthcare firm Headway, added, “Adoption of third-party software recently expanded a lot, but this expansion did not necessarily come with increased awareness of what the potential impact and risks are.”

Shadow AI vs. Shadow IT: How Freemium AI Tools Expand Risk

Shadow AI stands out from general shadow IT because of the diverse range of tasks employees use AI for.

The 1Password report showed that these range from customer call notes to transcribe and summarize (22% of respondents said they use AI for this) to performance reviews of hiring processes (16% of employees use AI in such a way).

AI tools are also leveraged for various data analytics use cases, with 16% of respondents using AI to analyze company data and 21% to analyze customer data.

Breakdown of the AI use cases recorded in the 1Password 2025 Annual Report. Source: 1Password
Breakdown of the AI use cases recorded in the 1Password 2025 Annual Report. Source: 1Password

Chiang explained the rise of shadow AI is connected to the model adopted by general-purpose generative AI tools early on.

“Generative AI made the freemium model popular again – and you can already do a lot with a free large language model (LLM) tool, for instance,” she started. “However, while a lot of employees understand the concept of contracts and risks, they don’t necessarily think risk management policies apply to free products.”

While the web-based, freemium app approach is prominent with generative AI tools, Brian Morris, VP and CISO at Gray Media, said the same conclusion applies to many shadow IT practices outside of AI tools.

“The real number of employees using shadow IT is probably much higher than 52% because we’re not just talking about downloading apps – people use web apps like Grammarly and Monday all the time that expose company data. But because they work through the browser, they don’t really think of them as apps,” Morris explained.

AI Governance Best Practices

To overcome some of these AI blind spots, the 1Password report recommended a three-step approach for AI governance:

  1. Maintain a complete inventory of AI tools in use at your organization and conduct regular audits
  2. Establish clear policies, enforce appropriate AI usage and guide users toward safe tools and behaviors
  3. Invest in controls to ensure only company-sanctioned AI tools can access company data

During the CISO roundtable, Headway’s Chiang also recommended risk-based security teams to not only focus on the highest identified risks, but to also spend time addressing low-to-medium risks that can be quickly addressed so that they don’t get overwhelmed by many issues at the same time.

“When it comes to AI, we talk a lot of ‘death by 1000 cuts,’ with many low to medium risks that are worth investing in and could be easily resolved by implementing education and awareness processes,” she explained.

The 1Password 2025 Annual Report is based on an online survey distributed by PureSpectrum among 5200 knowledge workers in Canada, France, Germany, Singapore, the UK and the US.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution
Next Article TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution
Team-CWD
  • Website

Related Posts

News

Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw

November 1, 2025
News

Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms

November 1, 2025
News

Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

November 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Watch out for SVG files booby-trapped with malware

September 22, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Look out for phony verification pages spreading malware

September 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.