© Copyright Acquisition International 2026 - All Rights Reserved.

Article Image - One in Three Enterprise Devices Lack Encryption as Shadow AI Runs Wild 
Posted 1st October 2025

One in Three Enterprise Devices Lack Encryption as Shadow AI Runs Wild 

Over one in three (35)% of enterprise PCs are not encrypted, despite standard security policies, amid millions of visits to generative AI platforms such as DeepSeek, often without formal approval or monitoring. 

Mouse Scroll AnimationScroll to keep reading

Let us help promote your business to a wider following.

One in Three Enterprise Devices Lack Encryption as Shadow AI Runs Wild 
Cybersecurity and business data management concept, Businessman security encryption on tablets secure internet access for personal big data

Over one in three (35)% of enterprise PCs are not encrypted, despite standard security policies, amid millions of visits to generative AI platforms such as DeepSeek, often without formal approval or monitoring. 

Without encryption, sensitive data on these devices is at greater risk of being exposed via these unsanctioned tools. This surge in Shadow AI activity heightens the risk of data leakage, governance failures, and serious compliance breaches for IT leaders. 

The findings were revealed in Absolute Security’s Cyber Resilience Risk Index 2025, analysing 15 million enterprise PCs for gaps in endpoint protection, device compliance and AI readiness.By assessing key metrics, the analysis pinpointed the primary barriers to achieving Extreme Resilience, having full visibility into the inherent risks in every layer of security architecture, and proposed actionable strategies to address these gaps. 

While a survey of 500 U.S.-based CISOs from Absolute Security, via independent polling agency Censuswide, found that 44% of security leaders are not aware of how widely generative AI tools are in use across their organization, or what information users are uploading onto these. 

As a result, 44% have stopped using AI due to fears of a cyber breach. 

Christy Wyatt, CEO of Absolute Security, commented: “The explosion of shadow AI use, combined with a third of devices lacking encryption, highlights a worrying gap between innovation and protection. As an industry, we spend so much time preparing for the next big attack, many enterprises are not meeting even basic security standards that can drastically boost resilience— like encryption, patch hygiene, visibility, and risk remediation. The stakes have never been higher. True cyber resilience means not just preventing breaches, but ensuring your digital operations can endure, adapt, and recover from any kind of cyberattack or incident.”  

For the complete Cyber Resilience Risk Index 2025 report visit: https://www.absolute.com/resources/research-reports/resilience-risk-index-2025 

Further findings from the Cyber Resilience Risk Index 2025

  • Enterprise Devices Are Missing Encryption: With 26% of devices being unaccounted for and 18% storing sensitive data, organizations are practically inviting data breaches creating dangerous blind spots for CISOs — increasing the risk of data loss, theft, and compliance violations. 
  • Security Tools Aren’t Holding the Line: Even with Endpoint Protection Platforms (EPP) and network access controls in place, security tools fail to stay compliant 22% of the time—leaving critical systems exposed nearly a quarter of the time— heightening the risk of ransomware, breaches, and operational instability. This shows minimal improvement from last year’s resilience index report, where Endpoint Protection Platforms (EPP) and network access security applications on managed PCs failed to operate effectively 24% of the time. 
  • Patching Delays Create Extended Risk Windows: Vulnerabilities in Windows 10 and 11 take nearly two months to patch. This prolonged delay offers a predictable and exploitable window for threat actors — especially in industries that rely on outdated infrastructure or manual patching processes. This shows a slight improvement from last year’s findings, where sectors like Education and Government faced patching delays of 119 and 82 days. However, the current 56-day delay still presents a considerable vulnerability window that leaves systems open to attack. It remains critical for organizations to streamline patching processes, as even minor delays continue to expose systems to potential threats. 

Categories: News, Technology


You Might Also Like
Read Full PostRead - Eye Icon
The Challenges of Determining Spousal Support When a Business Is at Stake
Legal
24/03/2026The Challenges of Determining Spousal Support When a Business Is at Stake

Divorce becomes more complicated when one spouse owns a closely held business, especially when that business is the family’s primary source of income. In these cases, spousal support cannot be determined by comparing pay stubs or applying a simple formula. T

Read Full PostRead - Eye Icon
AI and ESG: Where Do They Overlap?
Corporate Social Responsibility
06/11/2023AI and ESG: Where Do They Overlap?

AI and ESG are two boardroom topics that have more in common than you might think.

Read Full PostRead - Eye Icon
Tips on How to Keep Your Data Safe for Corporate Business
Innovation
05/01/2023Tips on How to Keep Your Data Safe for Corporate Business

Data breaches can even lead to business shutdowns. Shocking, isn’t it? Even if an enterprise is thriving and leading the competition every day, everything can go in vain with a single cyber-attack. With customer trust lost, the organisation’s secrets out,

Read Full PostRead - Eye Icon
Training Video Production: What You Need to Know
News
17/05/2023Training Video Production: What You Need to Know

From brands migrating online and working teams switching to a remote-first approach—to the world’s top-rated universities launching online courses for international students, the value of e-learning tools becomes more evident from day to day. And even

Read Full PostRead - Eye Icon
CafeX Closes on $21 Million Series B Raise
Finance
30/03/2015CafeX Closes on $21 Million Series B Raise

CafeX, a leading provider of real-time engagement solutions for mobile and web platforms, announced that it has closed on $21M in Series B funding.

Read Full PostRead - Eye Icon
TM Capital Corp Advises Jordan Company Through Purchase of DiversiTech
Legal
24/06/2015TM Capital Corp Advises Jordan Company Through Purchase of DiversiTech

TM Capital Corp Advises Jordan Company Through Purchase of DiversiTech

Read Full PostRead - Eye Icon
Innovation for Efficiency: Unleashing the Potential of Intelligent Battery Management
Innovation
21/07/2023Innovation for Efficiency: Unleashing the Potential of Intelligent Battery Management

In 2022, the global market size for battery management systems was USD 7.8 billion and is projected to reach a whopping value of USD 55.

Read Full PostRead - Eye Icon
How the US is Improving Worker Safety in Construction and Related Industries
News
17/06/2024How the US is Improving Worker Safety in Construction and Related Industries

How the US is Improving Worker Safety in Construction and Related Industries Construction and several related industries are among the most hazardous, accounting for nearly 20% of all workplace fatalities in the US, according to OSHA. Ensuring worker safety is

Read Full PostRead - Eye Icon
How To Secure Your Company Data During A Cloud Migration
News
15/11/2022How To Secure Your Company Data During A Cloud Migration

Moving digital assets into the cloud is a common trend for businesses nowadays. More of them find the convenience of organising and retrieval it affords highly advantageous to their operations.



Our Trusted Brands

Acquisition International is a flagship brand of AI Global Media. AI Global Media is a B2B enterprise and are committed to creating engaging content allowing businesses to market their services to a larger global audience. We have a number of unique brands, each of which serves a specific industry or region. Each brand covers the latest news in its sector and publishes a digital magazine and newsletter which is read by a global audience.

Arrow