b'TECHNOLOGY & INNOVATIONEMPOWERING SMALLsubscriptionhighlights the technologys accessi-bility and impact on educational quality.BUSINESSES WITHEmpowering Small Businesses with Customizable AI Technologies CYBERSECURITY CUSTOMIZABLECustomizable LLMs are at the forefront of a tech-nological revolution, fundamentally changing how LANGUAGE MODELS small businesses interact with customers and FOR DECENTRALIZED IT: BY KIHYUNG KIM compete globally. These advanced tools open up new avenues for engagement, particularly with the younger, tech-savvy generation, by enabling The digital age has ushered in a transformativearound-the-clock customer service and seamless As outsourcing becomes commonplace, era for small businesses, thanks to the advent ofinternational communication, all without the need for extensive technical expertise. Customizable Large Language Models (LLMs) like concerted cybersecurity is paramount OpenAIs GPT, Metas Llama, and Googles Gemini.Shifting Focus: How Customizable LLMs Mirror November 2023 marked a significant milestonethe Democratization of Media Production when OpenAI released a customizable version ofReflecting on the broader implications of customiz-GPT, making sophisticated technology accessibleable LLMs, we can draw parallels with the evolution without coding expertise, heralding a new dawn forof media production technology. Just as advance-small businesses. ments in camera and editing technology haveKihyung KimBY JACK PELIKAN Anomalous Activity Scans: Not Who but What?The Essence of AI and LLMsushered in the era of individual content creators, Former Cisco CEO John Chambers once quipped:Since cyberattacks are often perpetrated withAt its core, Artificial Intelligence (AI) mimics humancustomizable LLMs promise to democratize the compromised accounts, unbeknownst to the rightfulIT aspect of business operations. This technolog- The launch of There are two types of companies: those whointelligence in machines, capable of tasks from have been hacked, and those who dont yet knowuser, organizations can shift focus from who is onsimple computations to complex decision-making.ical democratization means that the content andcustomizable they have been hacked. Ubiquitous headlinestheir network to what they are doing. For example,LLMs, a crucial AI subset, process vast amountsservices offered, rather than the underlying tech- LLMs signifies underscore this sentiment, like 2023s MOVEitAI log scans can flag excessive downloads or activityof human language data to interact and generatenology, will become the focal point of competition.outside of working hours, or actions inconsistenta pivotal file transfer software breach that impacted overtext with remarkable human-like coherence. ThisConclusion 60 million people. Furthermore, the FBIs 2023with job responsibilities like sales staff accessingtechnological leap offers unprecedented tools forThe launch of customizable LLMs signifies amoment for Internet Crime Report estimates $12.5 billion inHR data. With AI distilling an overwhelming amountcontent creation, customer service automation, andpivotal moment for small business technologysmall business total losses, up over 80% from 2021. These trendsof log data into a consumable format, securityeducational assistance, previously the domain ofempowerment. With increased accessibility and personnel can proactively investigate and defendtechnology Jack Pelikan reflect increased automation and sophistication ofagainst attacks.corporations with deep pockets. user-friendliness, the potential for innovation andempowerment.cyber threats, exacerbated by decentralization ofTailoring Technology: global expansion is boundless. As we embrace these IT departments, via outsourcing to the cloud (e.g.,Network Segmentation: Moats within a Moat From General to Customizable LLMsadvancements, we must also consider the ethicalKihyung KimAmazon Web Services), and engaging vendors forAs Chambers suggests, cyberattacks are not aThe leap from general-use Large Language Modelsimplications and responsibilities that come with non-core competencies like web design, help deskmatter of if but when. As security resources are(LLMs) to customizable versions marks a significantdeploying AI technologies.There areand payroll, all of which introduce new risks thatfinite, and information varies in sensitivity, organi- evolution. General LLMs offer broad capabilitiesAcknowledgements: this manuscript was revised reinforce the adage a chain is only as strong as itszations can reduce exposures through risk-basedwithout specialization, suitable for a wide range ofwith the assistance of AI technology to ensure clarity two types ofweakest link.While cybersecurity varies by orga- network segmentation. For example, implementing tasks but not tailored to specific business needs.and effectiveness in communication.companies:nization, adherence to best practices, including themore secure sub-networks for confidential dataCustomizable LLMs, however, enable businesses to those who havefollowing examples, can mitigate exposures. like trade secrets and personnel records not onlymodify the AI to suit their unique requirements, from Principle of Least Privilege: Less is Moreadds defense layers beyond the corporate networkindustry-specific jargon to personalized customer been hacked,perimeter, but also restricts internal users, including Failure to maintain least privilege, where usersinteractions. This shift enhances the models rele-and those whohave only the minimum accesses needed to performthose compromised by hackers, from accessingvance and effectiveness, democratizing advanced dont yet knowtheir jobs, can have dire consequences like insensitive resources unrelated to their duties. AI technology for small businesses and allowing they have been2013s Target breach, where a compromised HVACStarting with Educationthem to compete on a level previously reserved for hacked. vendors account exfiltrated over 40 million creditSince hackers often deploy low-tech, psychologicallarger corporations with bespoke solutions.card records. While incomprehensible that a facilitiesmethods like phishing e-mails, continuous trainingReal-World Impact: John Chambers vendor could access payment data, the concept ofand communication across organizations and theirThe University of Missouri Experience Former Cisco CEO model after requests, where new users receive thestrategic partners are cybersecurity cornerstones.My journey as a faculty member at the University same access as pre-existing accounts, often withoutSince cybersecurity practices are habitual, earlyof Missouri, utilizing ChatGPT as a virtual teaching scrutiny, remain commonplace because of their effi- awareness of common threats (e.g., phishing redassistant, exemplifies the potential of customizable ciency. Since few organizations can maintain leastflags) and countermeasures (e.g., antivirus, pass- LLMs. This AI-driven helper, tailored to my syllabus, privilege manually, various tools can help streamlineword management, wireless security, encryption)managedcommunicationsandassignments, including security scans of access requests, anddelivered through engaging methods (e.g., scenar- significantly easing my workload. The simplicity temporary, privileged accounts subject to robustio-based games/quizzes, phishing exercises) canof setuprequiring minimal input and a modest check-in/out and logging requirements.strengthen even the weakest link and better prepare stakeholders for inevitable threats.6 2024 MANAGEMENT MATTERSMANAGEMENT DEPARTMENT 7'