{"id":32442,"date":"2025-11-03T05:00:00","date_gmt":"2025-11-03T04:00:00","guid":{"rendered":"https:\/\/sii.pl\/blog\/?p=32442"},"modified":"2026-02-18T15:55:27","modified_gmt":"2026-02-18T14:55:27","slug":"intelligent-boundaries-how-to-use-ai-without-losing-control","status":"publish","type":"post","link":"https:\/\/sii.pl\/blog\/en\/intelligent-boundaries-how-to-use-ai-without-losing-control\/","title":{"rendered":"Intelligent boundaries: How to use AI without losing control"},"content":{"rendered":"\n<p>This article aims to explain the situation surrounding AI, specifically the dangers associated with it. Everything is based on real data, with the hope of convincing readers to carefully review what they share, so they don&#8217;t cause problems for themselves or their company.\u200b<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>AI in everyday life<\/strong><\/strong><\/h2>\n\n\n\n<p>Most people use artificial intelligence services daily. AI has become an inseparable part of the modern workplace, offering unprecedented opportunities for increased productivity and innovation. But what if its involvement brings significant challenges in data security, regulatory compliance, and risk management? <a href=\"https:\/\/www.securitymagazine.com\/articles\/101773-68-of-organizations-experienced-data-leakage-from-employee-ai-usage\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >88% of data<\/a> breaches are due to employee errors, showing how widespread the lack of awareness is [<a href=\"https:\/\/www.securitymagazine.com\/articles\/101773-68-of-organizations-experienced-data-leakage-from-employee-ai-usage\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >1<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Current state and key challenges<\/strong><\/strong><\/h2>\n\n\n\n<p>A good example of AI content control is Microsoft. Everything generated by AI goes through a strict multi-level review process, which in their case is particularly demanding, <a href=\"https:\/\/www.cnbc.com\/2025\/04\/29\/satya-nadella-says-as-much-as-30percent-of-microsoft-code-is-written-by-ai.html\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >as Satya Nadella (CEO of Microsoft) claims<\/a> that as much as 30% of code is currently written by artificial intelligence [<a href=\"https:\/\/www.cnbc.com\/2025\/04\/29\/satya-nadella-says-as-much-as-30percent-of-microsoft-code-is-written-by-ai.html\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >2<\/a>]\u00a0<\/p>\n\n\n\n<p>Unfortunately, not all companies follow Microsoft&#8217;s example, and this rapid development represents a leap that comes with serious security challenges for many organizations. <a href=\"https:\/\/www.mckinsey.com\/capabilities\/quantumblack\/our-insights\/the-state-of-ai\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >Only 27% of companies<\/a> review AI-generated content before using it, which highlights a significant gap in quality control and security processes [<a href=\"https:\/\/www.mckinsey.com\/capabilities\/quantumblack\/our-insights\/the-state-of-ai\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >3<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>The problem of Shadow AI<\/strong><\/strong><\/h2>\n\n\n\n<p>A concerning phenomenon is the rise of so-called Shadow AI. What is Shadow AI? It involves employees using artificial intelligence tools without formal approval or oversight from IT and security departments. It&#8217;s an evolution of the previously known Shadow IT, but with far greater consequences and risks. <a href=\"https:\/\/www.cyberhaven.com\/blog\/4-2-of-workers-have-pasted-company-data-into-chatgpt\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >11% of data pasted by employees into ChatGPT<\/a> is classified as confidential [<a href=\"https:\/\/www.cyberhaven.com\/blog\/4-2-of-workers-have-pasted-company-data-into-chatgpt\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >4<\/a>]\u00a0<\/p>\n\n\n\n<p>Let&#8217;s look at this through an example.\u200b<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Example of Shadow AI: The story of Mr. Mark<\/strong><\/strong><\/h2>\n\n\n\n<p><strong>Meet Mr. Mark, a hypothetical Marketing Specialist<\/strong>. Mr. Mark works in a mid-sized IT company in Krak\u00f3w as a marketing specialist. He&#8217;s ambitious, loves new technologies, and continually seeks ways to enhance his productivity. Here&#8217;s how he gradually fell into the Shadow AI trap.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Week 1 \u2013 innocent beginning<\/strong><\/strong><\/h3>\n\n\n\n<p>Mr. Mark is supposed to write a newsletter to clients, but he&#8217;s lacking inspiration.<strong><\/strong><\/p>\n\n\n\n<p><strong>What he did:<\/strong> He opened ChatGPT on his personal account, pasted a product brief, and asked for help writing the newsletter. He received a great text in several minutes instead of spending two hours on work.<\/p>\n\n\n\n<p><strong>Result: <\/strong>The newsletter was sent at 9:00 instead of 11:00. The boss is happy, and the clients are delighted.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Week 2 \u2013 growing appetite<\/strong><\/strong><\/h3>\n\n\n\n<p>Mr. Mark was thrilled with the effectiveness. He started using ChatGPT for more specific tasks:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pasted Google Analytics data and asked for trend analysis<\/li>\n\n\n\n<li>Uploaded competitor images with logos and asked for strategy analysis<\/li>\n\n\n\n<li>Copied internal emails with financial information<\/li>\n\n\n\n<li>Pasted customer lists for segmentation<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Week 3 \u2013 first red flag<\/strong><\/strong><\/h3>\n\n\n\n<p>Mr. Mark noticed a competitor posted on LinkedIn using very similar terminology to their internal strategy.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Week 4 \u2013 it all falls apart<\/strong><\/strong><\/h3>\n\n\n\n<p>The security department reports &#8220;unusual data traffic&#8221; from Mr. Mark&#8217;s computer. The boss asks for a meeting.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The system detected 2.3GB of data sent to external servers<\/li>\n\n\n\n<li>There was a leak of confidential customer data, such as PESEL numbers, bank account numbers, etc.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>The finale of the &#8220;adventure&#8221; with the hypothetical Mr. Mark&#8217;s AI<\/strong><\/strong><\/h3>\n\n\n\n<p><strong>For Mr. Mark:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Immediate dismissal without severance<\/li>\n\n\n\n<li>Civil lawsuit from the company for damages<\/li>\n\n\n\n<li>Enhanced reputation in the industry<\/li>\n\n\n\n<li>Criminal proceedings for breach of trade secrets<\/li>\n<\/ul>\n\n\n\n<p><strong>For the company:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>RODO fines (2% of company turnover)<\/li>\n\n\n\n<li>Legal and audit costs<\/li>\n\n\n\n<li>Loss of revenue from departing clients<\/li>\n<\/ul>\n\n\n\n<p><strong>What really happened<\/strong><\/p>\n\n\n\n<p>It turned out that:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ChatGPT stored some data in the conversation history<\/li>\n\n\n\n<li>A competitor used similar queries and got fragments of Mr. Mark&#8217;s strategy in responses<\/li>\n\n\n\n<li>Client data was used to train the model and &#8220;leaked&#8221; in other responses<\/li>\n<\/ul>\n\n\n\n<p>Automated systems linked data from various sources to create a company profile<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Real-life examples<\/strong><\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Worldwide case: Samsung \u2013 source code in ChatGPT<\/strong><\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/www.forbes.com\/sites\/siladityaray\/2023\/05\/02\/samsung-bans-chatgpt-and-other-chatbots-for-employees-after-sensitive-code-leak\/\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >In May 2023, three employees from Samsung&#8217;s<\/a> semiconductor division used ChatGPT to help with work and unknowingly passed confidential company data:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a>First incident: An engineer pasted faulty source code from Samsung&#8217;s database into ChatGPT seeking a solution.<\/a><\/li>\n\n\n\n<li>Second incident: An employee entered program code to identify a faulty section, asking for optimization.<\/li>\n\n\n\n<li>Third incident:<strong> <\/strong>An employee converted a company meeting recording into text and gave it to ChatGPT for meeting notes<strong> <\/strong>[<a href=\"https:\/\/www.forbes.com\/sites\/siladityaray\/2023\/05\/02\/samsung-bans-chatgpt-and-other-chatbots-for-employees-after-sensitive-code-leak\/\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >5<\/a>]<\/li>\n<\/ul>\n\n\n\n<p><strong>Legal and organizational consequences:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Immediate total ban on using ChatGPT, Google Bard, and Bing Chat by all employees on company devices<\/li>\n\n\n\n<li>Threat of dismissal \u2013 Samsung warned: &#8220;Employees who violate or compromise company data by using generative AI may be terminated.&#8221;<\/li>\n\n\n\n<li>Uploads limited to 1024 bytes per prompt<\/li>\n\n\n\n<li>Necessity to build internal AI \u2013 Samsung had to create its own solution<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Case in Poland: PKO BP \u2013 Data leak through AI\/UEM systems<\/strong><\/strong><\/h3>\n\n\n\n<p>On September 8, 2025, PKO Bank Polski received a message from someone claiming to be a &#8220;tester&#8221; who said they had access to employees&#8217; business contact data. After verification, <a href=\"https:\/\/www.pkobp.pl\/media\/aktualnosci\/informacje-o-banku\/incydent-ujawnienia-sluzbowych-danych-pracownikow\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >an actual leak was confirmed<\/a> from the Unified Endpoint Management (UEM) system, which included AI elements for device management [<a href=\"https:\/\/dailydarkweb.net\/pko-bank-polski-allegedly-breached-data-of-32000-employees-for-sale\/\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >7<\/a>][<a href=\"https:\/\/www.pkobp.pl\/media\/aktualnosci\/informacje-o-banku\/incydent-ujawnienia-sluzbowych-danych-pracownikow\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >8<\/a>] <\/p>\n\n\n\n<p><strong>Scope of the Leak:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>32,815 users (employees) \u2013 names, surnames, email addresses, phone numbers<\/li>\n\n\n\n<li>17,135 devices \u2013 UUIDs, serial numbers, MAC addresses<\/li>\n\n\n\n<li>80 admin accounts \u2013 especially sensitive access data<\/li>\n<\/ul>\n\n\n\n<p><strong>Legal and Organizational Consequences:<\/strong><strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Immediate notification to the Personal Data Protection Office<\/li>\n\n\n\n<li>Risk of RODO fines \u2013 up to 4% of the bank&#8217;s annual revenue<\/li>\n\n\n\n<li>Damaged reputation \u2013 data offered for sale on the darknet<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Framework for safe AI usage<\/strong><\/strong><\/h2>\n\n\n\n<p>Now that the scale of the threat is clear, let&#8217;s examine what can be done to prevent repeating these mistakes. Here are the steps to consider.<\/p>\n\n\n\n<p><strong>Phase 1: Set your personal AI usage rules<\/strong> &#8211; Create your own &#8220;AI code&#8221; \u2013 clear rules you&#8217;ll stick to, so you don&#8217;t get into trouble.<\/p>\n\n\n\n<p><strong>Personal &#8220;Can do&#8221; list:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Help with writing \u2013 grammar correction, style improvement (but no confidential content!)<\/li>\n\n\n\n<li>Brainstorming \u2013 generating general project ideas (not specific ones)<\/li>\n\n\n\n<li>Learning and development \u2013 explaining concepts, translating generic texts<\/li>\n\n\n\n<li>Automation \u2013 creating templates, code snippets (without real\/sensitive data)<\/li>\n<\/ul>\n\n\n\n<p><strong>Personal &#8220;Cannot do&#8221; list:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Client data \u2013 no PESELs, phone numbers, addresses, emails<\/li>\n\n\n\n<li>Company information \u2013 strategies, budgets, access codes, passwords<\/li>\n\n\n\n<li>Confidential documents \u2013 contracts, financial reports, development plans<\/li>\n\n\n\n<li>Colleagues&#8217; personal data<strong> <\/strong>\u2013 employee lists, reviews, salaries<\/li>\n<\/ul>\n\n\n\n<p><strong>Phase 2: Secure yourself technologically<\/strong><\/p>\n\n\n\n<p>Learn to use AI to minimize risks. It&#8217;s like driving a car \u2013 you can go fast, but wear a seatbelt!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Practical tips for you<\/strong><\/strong><\/h3>\n\n\n\n<p><strong>Secure Login:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use separate accounts \u2013 personal AI on a personal laptop, business (if allowed) on a work computer<\/li>\n\n\n\n<li>Enable 2FA \u2013 two-factor login for all AI accounts<\/li>\n<\/ul>\n\n\n\n<p><strong>Data management:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Clean history \u2013 regularly delete AI conversations with work-related data<\/li>\n\n\n\n<li>Use &#8220;off-the-record&#8221; mode \u2013 if your AI offers this (e.g., ChatGPT has &#8220;temporary chat&#8221;)<\/li>\n\n\n\n<li>Check privacy settings \u2013 turn off model training on your data<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/sii.pl\/en\/job-ads\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"737\" height=\"170\" src=\"https:\/\/sii.pl\/blog\/wp-content\/uploads\/2025\/10\/praca-EN-k-5.jpg\" alt=\"job\" class=\"wp-image-32444\" srcset=\"https:\/\/sii.pl\/blog\/wp-content\/uploads\/2025\/10\/praca-EN-k-5.jpg 737w, https:\/\/sii.pl\/blog\/wp-content\/uploads\/2025\/10\/praca-EN-k-5-300x69.jpg 300w\" sizes=\"(max-width: 737px) 100vw, 737px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Summary<\/strong><\/strong><\/h2>\n\n\n\n<p>As shown, pasting the wrong code can mean a total ban on AI at your company and threaten your job. Data leaks from AI systems can result in millions of dollars in fines and cause irreparable reputational harm. <\/p>\n\n\n\n<p>Personally, I utilize AI for daily tasks, such as helping me write this article. I can confidently say AI is a tool that helps not only with daily tasks but also with personal growth. That&#8217;s why I strongly encourage everyone to use artificial intelligence, but always remember: &#8220;Everything is for people, but \u2026&#8221;.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Sources<\/strong><\/h2>\n\n\n\n<p>[1] <a href=\"https:\/\/www.securitymagazine.com\/articles\/101773-68-of-organizations-experienced-data-leakage-from-employee-ai-usage\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >68% of Organizations Experienced Data Leakage From Employee AI Usage<\/a><\/p>\n\n\n\n<p>[2] <a href=\"https:\/\/www.cnbc.com\/2025\/04\/29\/satya-nadella-says-as-much-as-30percent-of-microsoft-code-is-written-by-ai.html\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >Satya Nadella says as much as 30% of Microsoft code is written by AI<\/a><\/p>\n\n\n\n<p>[3] <a href=\"https:\/\/www.mckinsey.com\/capabilities\/quantumblack\/our-insights\/the-state-of-ai\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >The state of AI: How organizations are rewiring to capture value<\/a><\/p>\n\n\n\n<p>[4] <a href=\"https:\/\/www.cyberhaven.com\/blog\/4-2-of-workers-have-pasted-company-data-into-chatgpt\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >11% of data employees paste into ChatGPT is confidential<\/a><\/p>\n\n\n\n<p>[5] <a href=\"https:\/\/www.forbes.com\/sites\/siladityaray\/2023\/05\/02\/samsung-bans-chatgpt-and-other-chatbots-for-employees-after-sensitive-code-leak\/\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >Samsung Bans ChatGPT Among Employees After Sensitive Code Leak<\/a><\/p>\n\n\n\n<p>[6] <a href=\"https:\/\/www.businessinsider.com\/samsung-chatgpt-bard-data-leak-bans-employee-use-report-2023-5?IR=T\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >Samsung Bans Staff From Using AI Like ChatGPT, Bard After Data Leak &#8211; Business Insider<\/a><\/p>\n\n\n\n<p>[7] <a href=\"https:\/\/dailydarkweb.net\/pko-bank-polski-allegedly-breached-data-of-32000-employees-for-sale\/\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >PKO Bank Polski Allegedly Breached &#8211; Data of 32,000 Employees for Sale &#8211; Daily Dark Web<\/a><\/p>\n\n\n\n<p>[8] <a href=\"https:\/\/www.pkobp.pl\/media\/aktualnosci\/informacje-o-banku\/incydent-ujawnienia-sluzbowych-danych-pracownikow\" target=\"_blank\" rel=\"noopener\" title=\"\" rel=\"nofollow\" >Incydent ujawnienia s\u0142u\u017cbowych danych pracownik\u00f3w<\/a><\/p>\n\n\n<div class=\"kk-star-ratings kksr-auto kksr-align-left kksr-valign-bottom\"\n    data-payload='{&quot;align&quot;:&quot;left&quot;,&quot;id&quot;:&quot;32442&quot;,&quot;slug&quot;:&quot;default&quot;,&quot;valign&quot;:&quot;bottom&quot;,&quot;ignore&quot;:&quot;&quot;,&quot;reference&quot;:&quot;auto&quot;,&quot;class&quot;:&quot;&quot;,&quot;count&quot;:&quot;3&quot;,&quot;legendonly&quot;:&quot;&quot;,&quot;readonly&quot;:&quot;&quot;,&quot;score&quot;:&quot;5&quot;,&quot;starsonly&quot;:&quot;&quot;,&quot;best&quot;:&quot;5&quot;,&quot;gap&quot;:&quot;11&quot;,&quot;greet&quot;:&quot;&quot;,&quot;legend&quot;:&quot;5\\\/5 ( votes: 3)&quot;,&quot;size&quot;:&quot;18&quot;,&quot;title&quot;:&quot;Intelligent boundaries: How to use AI without losing control&quot;,&quot;width&quot;:&quot;139.5&quot;,&quot;_legend&quot;:&quot;{score}\\\/{best} ( {votes}: {count})&quot;,&quot;font_factor&quot;:&quot;1.25&quot;}'>\n            \n<div class=\"kksr-stars\">\n    \n<div class=\"kksr-stars-inactive\">\n            <div class=\"kksr-star\" data-star=\"1\" style=\"padding-right: 11px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 18px; height: 18px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"2\" style=\"padding-right: 11px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 18px; height: 18px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"3\" style=\"padding-right: 11px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 18px; height: 18px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"4\" style=\"padding-right: 11px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 18px; height: 18px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"5\" style=\"padding-right: 11px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 18px; height: 18px;\"><\/div>\n        <\/div>\n    <\/div>\n    \n<div class=\"kksr-stars-active\" style=\"width: 139.5px;\">\n            <div class=\"kksr-star\" style=\"padding-right: 11px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 18px; height: 18px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 11px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 18px; height: 18px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 11px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 18px; height: 18px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 11px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 18px; height: 18px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 11px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 18px; height: 18px;\"><\/div>\n        <\/div>\n    <\/div>\n<\/div>\n                \n\n<div class=\"kksr-legend\" style=\"font-size: 14.4px;\">\n            5\/5 ( votes: 3)    <\/div>\n    <\/div>\n","protected":false},"excerpt":{"rendered":"<p>This article aims to explain the situation surrounding AI, specifically the dangers associated with it. Everything is based on real &hellip; <a class=\"continued-btn\" href=\"https:\/\/sii.pl\/blog\/en\/intelligent-boundaries-how-to-use-ai-without-losing-control\/\">Continued<\/a><\/p>\n","protected":false},"author":750,"featured_media":32440,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","inline_featured_image":false,"footnotes":""},"categories":[1319],"tags":[2892,1631,1526,1336,1442],"class_list":["post-32442","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-soft-development","tag-llm-en","tag-chatgpt-en","tag-guidebook","tag-cybersecurity-en","tag-ai-en"],"acf":[],"aioseo_notices":[],"republish_history":[],"featured_media_url":"https:\/\/sii.pl\/blog\/wp-content\/uploads\/2025\/10\/Cybersecurity_3.jpg","category_names":["Soft development"],"_links":{"self":[{"href":"https:\/\/sii.pl\/blog\/en\/wp-json\/wp\/v2\/posts\/32442"}],"collection":[{"href":"https:\/\/sii.pl\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sii.pl\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sii.pl\/blog\/en\/wp-json\/wp\/v2\/users\/750"}],"replies":[{"embeddable":true,"href":"https:\/\/sii.pl\/blog\/en\/wp-json\/wp\/v2\/comments?post=32442"}],"version-history":[{"count":1,"href":"https:\/\/sii.pl\/blog\/en\/wp-json\/wp\/v2\/posts\/32442\/revisions"}],"predecessor-version":[{"id":32446,"href":"https:\/\/sii.pl\/blog\/en\/wp-json\/wp\/v2\/posts\/32442\/revisions\/32446"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sii.pl\/blog\/en\/wp-json\/wp\/v2\/media\/32440"}],"wp:attachment":[{"href":"https:\/\/sii.pl\/blog\/en\/wp-json\/wp\/v2\/media?parent=32442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sii.pl\/blog\/en\/wp-json\/wp\/v2\/categories?post=32442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sii.pl\/blog\/en\/wp-json\/wp\/v2\/tags?post=32442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}