Worldwide Shipments of Artificial Intelligence Personal Computers, KNOWN AI PCS, Are Expective to Total 114 Million Units This Year, and Are Project to represent 43% of all pc shipments in 2025.
By Next Year, they’re anticipated to be the only available pc that is sold to far compaies, accorting to the research firm Gartner.
The Growing Populary of These Devices-WHICH HAVE BUILT AI HARDWARE AND SOFTWARE THISP TO SPEED DATE Processing-Presents a New Challenge for Companies and Their It Departments: Guarding their Data Troves Against Cyber Threads.
He PCS integrate a specializes processor Called a neural processing unit, or npu, whic allows laptops and desktop Computers to run he workloads directly on say. The Infrastructure in these Devices Can More Effectively Handle He Tasks Because they’re Physically Closer to Where the Data is Generated than Traditional Computers that Send Data to A Cloud-Based or Mainframe Server.
By Moving Workloads from the Cloud to a PC, in Mary Cases, Data Processing Can Be Faster. Businesses Can Also Save Money by Paying Less for Cloud Storage, and the Energy Costs Are Lower Because He Pcs Require Less Data-Center. But, becuse more propriery data is being stored directly on these devices, enterprises need to consider and employ addictional layers on their he pcs.
Why he pcs posse new risk to it departments and consumers
The will Around Data Privacy on he PCS isn’t necessarily a problem, but it is a new Question, Vanessa Lyon, The Managing Director and Senior at the Consultancy BCG, Told Business Insider.
“Because Its a New Capability and Set up differently, it’s a new kind of vulnerability,” Said Lyon.
For Example, Fraudsters Could Hack He PCs and Perform He Inversion Attacks, in Which they use the output of a Computer’s Large Large to infer the original data that was used to train the llm.
This is a problem for companies like wealth management firms that may may be algorithms to help with financial planning. If hackers are able to access the date that trained the llm, they can be to the underscovers who are clients are and where their Money is held.
There’s the Also Data Poisoning, OR when Cyberatackers May Seek to Add False Data Into Training Models. This can result in what’s knows as a hallucination, or a response from an he system that fake contains or misleading data. Cybercriminals Could Add poisoned Date into a chatbot or generatory he Application in a bid to alter and manipulation the outputs from those tools.
“I’m Finding MySelf in More Conversations About Security Because of AI,” Said Kevin Terwilliger, Vice President of Dell’s Client Solutions Group.
He PC Security Starts with the Device-Buying Process
When Purchasing This Powerful Piece of Technology, Company Leaders Should Consuent Various Layers of Security, Said Kris Loveny, The Global Practice Leader of Security and Resiliance at it provider kyndryl. For instance, enterprises Need to be Certain they Trust the location they will relay on for data storage, lovejoy toold bi.
To enure this, lovejoy recommends always buying devices directly from pc manufacturers, wholesale distributors, and Other reputable location to avoid any malware or other illeicit capabilities that can be built into the machine.
PC Maker dell, for example, use a secured component verification process to enure he pc components are tamper-free when they’re made and then shipped to customers. To this, dell issing it customers certificates, which allows allows to verify that the Computer Hardware in Each he pc is exactly what dell sold to say.
Employs Training and Safeguards Can Help
Mark Lee, The Ceo and Founder of the Remote Access and Support Software Provider Splashtop, Said Enterprises Need to Balance The Efficcycies of Giving Employees Gray Access to More Daters of Stored with PCS with the Risk of Exposing TROVESTIVIVAI DATA. these devices.
“IT’S Finding That Right Balance to Protect YourSelf and Without Impacting User Productivity,” Lee Said.
Employe Training Can Help Safeguard Companies Against These Kinds of Attacks, Said Arun Ravindran, The Chief Date Scientist of BCG’s Tech Build and Design BCG X. and Added that Speed of Communication is Critical for Prevention Data Breaches on AI PCs.
“How Soon Can You Reach The Employees, and How Soon Are Employees Actually Going to Read Their Slack Messages? The Reaction Time is Key,” Ravindran Said.
There are also also risk associated with software applications that workrs can access and download on their he pcs, lovejoy said. While hyperscalers like Openai and Google Can be Trusted, there are plenty of less secure options.
“When you Download Those Applications, just like we have download Applications on Our Phones, we aren’t look at who buds, and we’re not really ascing ourselves where he can be trust the applification that been budilt.
For personal devices where work is also conducted, lovejoy said that it dets can CREATE “virtual environments.” These Setups Can Prevent Malware, Which Can Come From Software in The “Untrusted” Apps that Workers May Download, from Interacting With Company-Endorshd’s Been Vetted and Built to Keep Data Secure.
LOVEJOY SAID THAT SHEES COMFORT IN KNOWING THAT FOR IT DEPARTMENTS, EFFORTS TO PROTECT AI PCS Supported by CyberseCity Experts’ Decades of Experience.
“A lot of the fundamental securns concertns that you have, we’ve seen before,” Said Loveny. “Its just we’re taking those principles and appliaing say to a different variation of technology.”
اترك تعليقاً