From the Spring 2026 Issue

Balancing Cyber Threats, Risks, and Everyday Work

Sandy Jacolow
Chief Technology Officer | Empire State Realty Trust

Corporations today face a difficult balancing act. Cyber threats are more sophisticated, phishing and social engineering attacks are highly targeted, and trust is increasingly exploited as an attack vector. At the same time, employees are rapidly adopting AI tools to move faster and work more effectively, often using platforms not designed to protect sensitive corporate data.  Unfortunately, employees are also facing AI taking over many of their positions, leaving them challenged and under pressure.

The challenge is no longer only securing systems but protecting the business without making security itself a barrier to productivity.

The tension is unavoidable. Stronger controls are necessary to defend against modern threats, yet every additional prompt, restriction, or guardrail risks slowing work, frustrating employees, and driving risky workarounds. The challenge is no longer only securing systems but protecting the business without making security itself a barrier to productivity.

A Harder Problem than Before

Cybersecurity has evolved from a largely technical discipline into a human and operational one. Many of today’s most successful attacks do not rely on malware or system vulnerabilities. They rely on persuasion, urgency, context, and social engineering.  The sophistication of these threat vectors has become a full-time business for some, a thrill for others, and, worst of all, a nation-state looking to steal intellectual property.  A convincing phishing email, a message that appears to come from a trusted executive, or a carefully timed request can bypass even mature security programs.

AI adoption compounds this challenge, enabling speed and efficiency for both corporations and bad actors.  Generative AI tools are now embedded in everyday Business Productivity Applications used for basic tasks such as drafting emails, summarizing documents, and analyzing data. Unfortunately, these tools are built for a specific purpose, and many AI platforms do not meaningfully isolate user inputs from training, retention, or external exposure.  This creates real risk.  From a business standpoint, attempting to ban AI outright is rarely effective and often counterproductive, leading to inefficiencies and a lack of staff training.

Meanwhile, security teams are under pressure to reduce risk, meet regulatory requirements, and demonstrate effective oversight. This can result in layered controls that are misaligned with how people actually work and that conflict within the operational environment.  As this friction increases, behavior shifts to preserve productivity, often displacing risk into less visible, less governed, and ultimately higher-impact areas of the enterprise.

Design Over Control

Organizations that manage this balance well tend to approach security as a design problem rather than a control problem. Instead of relying on static, one-size-fits-all rules, they focus on making protection adaptive and largely invisible. In practice, this means allowing normal, low-risk activity to proceed without interruption, while increasing scrutiny when something deviates from expected behavior.

When rules are clear and aligned with how people work, compliance improves naturally.

Clear policies and simple decision-making frameworks also reduce disruption. Employees should not have to guess what is allowed or escalate routine questions to security teams. Well-designed guidance explains expectations in practical terms, especially around AI use, data handling, and external sharing. When rules are clear and aligned with how people work, compliance improves naturally.

Managing AI Risk

Organizations that strike the right balance around AI tend to focus less on the tools themselves and more on the data being shared. The real risk is not AI usage, but uncontrolled data exposure.

Rather than banning AI, these companies provide approved platforms that have been reviewed for data handling, retention, and auditability. At the same time, they establish clear boundaries around what types of information should never be shared externally, regardless of whether the destination is an AI tool or something else.

This approach allows employees to benefit from AI while keeping its use governed and transparent. It also avoids shadow usage that inevitably follows blanket restrictions.

Secure by Default

A strong indicator of a mature security posture is how little effort it requires from employees—and how rarely it interrupts their flow. Even small disruptions, such as an unexpected reboot to complete a patch, can create outsized frustration and erode goodwill toward security programs. Organizations that manage this well focus on automation, secure defaults, and thoughtful timing.

Authentication, access management, device protection, and patching are designed to run quietly in the background, with disruptive actions scheduled outside of core working hours whenever possible. Single sign-on and adaptive authentication reduce repeated prompts, while updates and reboots are deferred, coordinated, or completed after hours to avoid breaking concentration during the workday.

When employees rarely notice security controls, they can work without interruption, leading to better compliance, productivity remains high, and a stronger overall security posture as a result.

Planning for Impact, not Perfection

Another critical shift is accepting that no defense is perfect. Instead of trying to prevent every incident, leading organizations focus on limiting impact when something does go wrong.

Precision matters more than blanket shutdowns.

This includes segmenting systems and data, quickly isolating compromised accounts or devices, and responding in ways that contain issues without shutting down the business. Precision matters more than blanket shutdowns. Keeping incidents small and recoverable reduces both operational disruption and downstream risk.

The Balance that Matters

There is no permanent balance between security and convenience.  It changes as threats evolve, technology advances, and business grows. The organizations that get this right follow a simple rule: security should stop attackers, not stand in the way of people doing their work.

When cybersecurity is adaptive, risk-based, and designed around real workflows, it becomes less visible and more effective. In our AI-enhanced, digitally driven world defined by constant change, that balance is what enables both security and the business to move forward. lock

Sandy Jacolow

Leave a Comment