Cybersecurity in the AI Era: Why Small Businesses Can’t Afford to Ignore IT Risks
Is your business truly prepared for the cybersecurity threats of the AI era?
In this episode of the Las Vegas IT Podcast, Leo shares powerful insights from his 30-year journey through IT and cybersecurity, diving deep into how artificial intelligence is changing the game—for both hackers and businesses.
What to Expect in This Episode:
🧠 Cybersecurity Then vs. Now
Trace the evolution of IT security and learn how today’s AI-driven environment has raised the stakes for businesses of all sizes.
⚠️ AI in the Wrong Hands
Understand how cybercriminals are weaponizing artificial intelligence—and what you can do to outpace them.
🏠 Securing the Remote Workforce
Get practical tips on managing the unique security risks that come with hybrid and remote teams.
📋 The Importance of Compliance
Discover why PCI compliance is non-negotiable and how neglecting it can expose your company to serious financial and legal consequences.
🤝 MSPs: More Than Just Tech Support
Leo reveals the strategic role Managed Service Providers play in building trust, protecting data, and preparing businesses for the future.
This conversation also debunks the myth that small businesses aren’t targets for cyberattacks Leo explains why they’re often the most vulnerable. With real-world examples and expert guidance, this episode is a must-listen for any leader serious about digital security in today’s AI-driven world.
Disclaimer: The views expressed in this episode are those of the guest and do not necessarily reflect the official policy or position of the Las Vegas IT Podcast, K&B Communications, or affiliated organizations.
Stay Ahead with K&B Communications
If this episode sparked new ideas or concerns about your company’s security posture, don’t stop here.
🔒 Let’s talk about your cybersecurity strategy.
Whether you need structured cabling, robust security systems, or expert IT support, K&B Communications is here to help.
📲 Follow us for insights and updates: Facebook Instagram LinkedIn
🎥 Subscribe on YouTube for expert interviews and tech tips: Youtube
📅 Ready to level up your tech infrastructure? Schedule your consultation today
Transcript
So now anybody that is non-technical can use AI to create little applications.
2
:While you can't ask, you know, Chatchity to create some ransomware for you, you can ask it
to create all the pieces that then when put together becomes ransomware.
3
:And there's a lot of tools that, know, that AIs that are not commercial, that they can
build on their own and kind of remove those checks and balances.
4
:So now people that aren't even sophisticated.
5
:can get involved in some of those malicious activities.
6
:Welcome to the Las Vegas podcast.
7
:Today I have the pleasure of speaking with Leo.
8
:This is our second conversation and I'm super, super excited to get to know a little bit
more about what he's been up to.
9
:He is with Healthy Technology Solutions.
10
:How are you doing today, Leo?
11
:Hey, thanks for having me on.
12
:I'm doing great.
13
:Happy Monday.
14
:Yeah, happy Monday.
15
:Mondays are a beautiful thing.
16
:We've had a discussion in the past and I am super excited to have you back on the show.
17
:You're actually our first person that we've had back on the podcast, which is pretty
exciting.
18
:No, glad to be back.
19
:Yeah, that was very very exciting and we did have a great discussion, but can you just
remind our audience about your background and what led you into the IT and cybersecurity?
20
:I've got a useless, what I call BSBA, and BS is not Bachelor of Science.
21
:And so right out of college, I'm looking for a job and somebody I interviewed with liked
me and they said, what do you want to do?
22
:I said, I don't know, what do you got?
23
:And they said, how about computer networking?
24
:And that was about 30 years ago.
25
:So learned pretty fast and ended up in a consulting environment where you really learn
fast.
26
:So every year is like 10 years in a regular job.
27
:So that's pretty much how I ended up doing it.
28
:That was in California, built up the business there, sold it, moved to Las Vegas, kind of
started over again, just to be in a more tax and business friendly state.
29
:And we've since expanded to Florida and San Antonio.
30
:wow.
31
:Well, that's very exciting.
32
:And I'm sure as you said, within this industry, things do grow and change pretty quickly.
33
:Absolutely.
34
:What are some of the changes that you've seen in the last 30 years?
35
:When I first started, was, when I first got an IT, there was no internet.
36
:mean, there was, but it was like the ARPANET or whatever, the university system.
37
:It took me about a year to convince at that point, my first employer to get me an internet
account, just a dial-up account to get online.
38
:So it was, from that to now you can't do business without internet access and everybody,
every cell phone has faster access than we did.
39
:even paying thousands of dollars a month for internet, you years ago.
40
:So it really, you know, the remote access piece, I mean, especially the MSP business,
which really didn't exist 30 years ago, it really started about maybe 20, but it couldn't
41
:exist back then because we didn't have that remote access.
42
:We didn't have the ability to monitor our clients.
43
:We didn't have the ability to remotely connect and remediate issues.
44
:So there's a lot of changes.
45
:Got it and with someone who's I'm 32 years old, but his I grew up with a well.
46
:And I honestly could not imagine what it was like 30 years ago.
47
:Like what your job would be if you could I started kind of take you back but very
interesting and kind of what that looked like 30 years ago.
48
:There was some before.
49
:I.T.
50
:was really it was literally just help desk and physically, you know, making sure the
servers are running, making sure the end users could work and resolving hardware issues,
51
:resolving some user training issues.
52
:But what it's migrated into is we are now cyber security that happens to do I.T.
53
:So if it if if the business is not secure, if the business is.
54
:If their data gets deleted or encrypted or their systems are brought down by bad guys,
there's no business.
55
:So our primary focus now is security and then everything else is secondary.
56
:Back then, our primary business was making sure people's stuff worked and helping them
maybe understand how to work with it more efficiently or better or use shortcut keys,
57
:things like that.
58
:Whereas now that is not really an afterthought.
59
:It's still important because the customer service piece and working with our end users is
very important.
60
:But if their systems are down because of bad actors, you know, and I don't mean, you know,
Mel Gibson or, you know, Jean-Claude Van Damme.
61
:mean, like bad actors from North Korea or China or Iran, you know, or the script kitty
that lives in his parents' basement in Des Moines, Iowa.
62
:All those people want to do is...
63
:damage people's businesses and steal.
64
:So if we miss any of those opportunities or give them opportunities to do that, it doesn't
really matter what kind of customer service we have or how well we treat our end users or
65
:what we've taught them because there's no business and there's nothing for them to work
on.
66
:So that's really the main difference.
67
:Got it.
68
:And then you didn't mention like someone possibly sitting in their, you know, I don't
know, in their mom's basement or someone in a different country.
69
:What are some ways that companies can protect themselves when it comes to these people
that are trying to do harm to their business?
70
:So first of all, you're, know, nobody is immune.
71
:So, and anyone that says, hey, do what I tell you or pay me and you'll be a hundred
percent secure, I would run because there's nobody can be a hundred percent secure.
72
:know, major government agencies with billions of dollars in budget are getting
compromised.
73
:So it's really a matter of really paying it, you know, it's really doing a holistic
approach to security and, you know, doing everything you can.
74
:And then making sure you've got the right backups in place, making sure that you have
contingency plans.
75
:But really, it's a combination of end user training, training the staff not to fall victim
to the millions of phishing emails, the social engineering phone calls, or now there can
76
:be social engineering video calls.
77
:So you can actually have a call that looks just like this, but it's not the person you
think it is.
78
:It could be just an AI-generated conversation.
79
:on video.
80
:So you actually can no longer trust the voice you're talking to as the person whose voice
you know, whether it's your family member or it's a business associate.
81
:And now at the point where soon by the end of this year, I guarantee that video deepfakes
will be mainstream.
82
:If there's already been a few that have been compromises or thefts using video deepfakes,
but it's going to become much, much more mainstream as our
83
:There'll be free tools online to do these things.
84
:So there's a training, but then there's always the regular antivirus, the anti-malware,
the managed detection response, the advanced detection response, the data backup.
85
:If you combine all of those things with the end user training, then you are not low
hanging fruit.
86
:It's like being the only house on the street without an alarm and a rottweiler.
87
:If everybody else has a alarm system and a big sign that says we will shoot you if you
come through our door and yours has a little peace of love and you know, your house is the
88
:ones can get burglarized.
89
:So not being a hanging fruit for most businesses really is the best defense.
90
:Now, if know, North Korea or Russia or, you know, China or Iran decide they want your
data, that's a different story.
91
:That's much more difficult.
92
:But for the average business we deal with,
93
:whether it's a doctor's office, a law firm, a construction firm, architecture firm,
they're not being directly targeted by these nation states.
94
:They're just being targeted by kind of the shotgun approach.
95
:You shoot a shotgun in the air and you hope a pellet hits something.
96
:That's what the bad guys are doing.
97
:They're sending out millions of emails or billions of emails.
98
:They're hoping somebody clicks on it.
99
:And if you end up on some kind of a list, maybe they try calling you and try and do some
deep fakes.
100
:and do a little bit of research, but it's a different level, whether you're, you if you're
the NSA or the office of personnel management for the U S government, there's a different
101
:threat level than Dr.
102
:Smith's pediatric office, that sort of thing.
103
:So for normal businesses that we have here, it's it's doing all the kind of, all the
things that you need to do, the training, the backup and the higher level of, of security
104
:software.
105
:And ideally some
106
:zero trust approach.
107
:It's that white listing saying nothing can run on my employees' computers that hasn't been
approved already.
108
:So that's kind number one in our mind.
109
:If we can prevent bad things from running, and we don't know what those bad things are.
110
:So the only way to protect you from everything is to say nothing other than this list of
20 applications is allowed to run.
111
:And then you're much more safe.
112
:than maybe your neighbor who doesn't have that.
113
:Understood.
114
:I know Leo, that was a lot of great information.
115
:I had like a hundred different questions that came up to mind when you were speaking.
116
:So I do have a question that one of the questions I do have is, you when it comes to
sources or websites that remote employees can go to, like, how do you protect the
117
:organization when you have remote employees?
118
:So it depends on whether those remote employees are using your company-owned computers
that you can completely lock down, just like as if they were in your office, or if they
119
:are offshore employees.
120
:So if they're employees, let's say in Philippines, India, Central South America, whatever
the case might be, that are using their own personal computers and you're hiring them
121
:through an agency, you can't lock those down because they don't belong to you.
122
:So now the question is, how do you...
123
:have them working on your company's data.
124
:What we do for our clients with those types of employees is we set them up with Azure
Virtual Desktops.
125
:So Microsoft Azure, those desktops are set where they can't download anything from that
virtual desktop to their computer.
126
:They can't print to printers, they're attached to their computer.
127
:They can't exfiltrate data and they can't install anything on that virtual desktop.
128
:because completely locked down.
129
:So now they only have access to the programs, the applications that you allow them to.
130
:And then if you use some productivity monitoring tools, you know what websites they're
going to.
131
:You you block malicious websites or websites that maybe are inappropriate for your
business.
132
:You block known compromised websites.
133
:There's a lot of things that you can do, but that would be my strong recommendation.
134
:Never allow...
135
:somebody that's getting paid $5 an hour in the Philippines who's using the family
computer.
136
:That's the computer that, you know, cause you're not talking about people that would, you
know, for them $5 an hour is a really good wage.
137
:They actually have a really nice life, you know, then they have benefits and everything
else, but they don't have five laptops and, you know, and iPads and everything else in
138
:their home.
139
:So their kids and their spouse are also using that same computer.
140
:So you don't want your company data touching
141
:or those computers touching your company networks.
142
:So you have to use kind of an intermediary and using a virtual desktop.
143
:When we happen to use Azure, some people use VMware, some other people use Citrix.
144
:I mean, there's a lot of different, know, Amazon Web Services has some virtual desktop
solutions.
145
:There's a lot of ways to skin the cat, but you need some kind of a solution to separate
those remote employees from your data.
146
:Got it.
147
:Leo, I might be getting out with you very shortly on that.
148
:So thank you for sharing that with me.
149
:And then, I mean, it's been a couple months since we've chatted.
150
:Has anything changed within your organization since a few months ago?
151
:So there's a couple of things we added San Antonio as a service area, which is exciting
because Texas is a big place.
152
:And we've also added credit card processing to our services just because we found that a
lot of customers, a lot of our existing clients are not PCI compliant and they're getting
153
:charged a PCI non-compliance fee, which is not a big deal.
154
:Per se, it might be $29 a month or $75 a month, whatever the case might be.
155
:That's not so much the issue.
156
:The issue becomes that if they have a customer that they sell something to and that person
uses a credit card that then charges that back.
157
:If they're not PCI compliant, then they can't contest those chargebacks.
158
:So if it's, let's say a plastic surgery, you medical practice, and they're doing some kind
of reconstructive surgery and it's $20,000 because it's not covered by insurance, someone
159
:charges 20 grand on their credit card, has a surgery and then charges it back.
160
:If they're not BCI compliant, have no leg to stand on.
161
:They just lost that money.
162
:mean, they could sue the person individually, but what business wants to deal with that?
163
:Where all you need is just a little bit of care once a year to run a little test that
keeps you compliant.
164
:Got it, and what are some ways that companies or organizations can make sure that they are
PCI compliant?
165
:look at their credit card statements, their merchant statements.
166
:It'll say that they'll show that there's a non-compliance fee.
167
:If you're paying a non-compliance fee, according as far as that merchant services company
is concerned, you're not compliant, which means that you don't have appeal rights and
168
:things like that.
169
:So it's really just a matter of logging into the portal.
170
:We do this for a lot of our clients where we'll log in, we'll run the tests and make sure
that they are compliant.
171
:And for our clients that we process for.
172
:we definitely make sure that they're compliant, just because that's really one of the
reasons that they're with us.
173
:Got it.
174
:No, it is a huge, huge thing.
175
:So then that's so amazing that that's something that you offer.
176
:And when it comes to cyber cybersecurity threats, you they're constantly changing, they're
constantly evolving.
177
:What are some of the biggest threats businesses are facing today?
178
:So it's still the same things that have been going on for the last few years.
179
:The business email compromises is a major issue because once they get into your email
account, they have everything that you've sent or received.
180
:They know who you talk to, they know how you talk.
181
:And there oftentimes will be things in your email like credit card statements or phone
bills.
182
:And those phone bills oftentimes have your PIN.
183
:So now they can potentially steal your number.
184
:you know, if they get into your bank or they try to do a password reset, they set a rule
to that where that email then gets forwarded to them.
185
:They could potentially take over your bank account and then they pour your their user pin.
186
:They're able to transfer your cell phone number to a burner phone and they receive the
text from the bank to confirm.
187
:And so now they have full access to your bank.
188
:You know, Microsoft 365.
189
:used to be that if you had multifactor authentication, you were safe.
190
:Well, now just clicking on a bad link while you're logged into your Microsoft 365, they
steal your session token.
191
:They can insert it on their computer.
192
:Now they're in as you with a completely bypassing multi-factor authentication.
193
:So there's those types of things that are major threats.
194
:But on top of that, throw in all the AI.
195
:So now anybody that is non-technical can use AI to create little applications.
196
:While you can't ask, you know, chat GPT to create some ransomware for you, you can ask it
to
197
:to create all the pieces that then when put together becomes ransomware.
198
:And there's a lot of tools that, know, that AIs that can be, that are not commercial, that
they can build on their own and have, you know, and kind of remove those checks and
199
:balances.
200
:So now people that aren't even sophisticated can get involved in some of those malicious
activities and throw in now the ability to speak with anybody's voice.
201
:So anybody, no matter what your accent can now sound like, know, sound like me, sound like
you, and they can call your employees, they can call your family and pretend to be you and
202
:ask for stuff.
203
:So there's like that ability to really fool people.
204
:So all of those things combined really make it a very dangerous neighborhood online.
205
:Got it, and you did mention trainings.
206
:Like what are some of the trainings that employers should be offering to their employees
to protect their business?
207
:Well, it's the security awareness training.
208
:It's what are the threats?
209
:How do you, you know, how do you browse the internet?
210
:Cause most people, if they want to go to, you know, a particular website, they search for
that website instead of typing in the, you know, the website name that they know they're
211
:searching for, let's say Wells Fargo.
212
:And then they click on the very first link that pops up.
213
:Oftentimes that first link is malicious.
214
:It's versus if you just type wallsfargo.com and hit enter, you go right there.
215
:You go right to that website.
216
:So just little things like that.
217
:But also how to spot a phishing email, how to check, hover over the URL to see where it
really goes.
218
:How to not be fooled by people pretending to be coworkers, HR people not changing the
direct deposit information for an employee based on an email that was either compromised
219
:or fake.
220
:Bob Smith.
221
:you know, an ABC company dot com sends an email to HR from, you know, Bob Smith, Bob Smith
at, you know, bad guy dot, you know, CN from China.
222
:That's probably not the person you probably shouldn't take, you know, change, change where
you're direct depositing their, their, their next paycheck, you know, a couple of days
223
:without maybe calling them on the phone and saying, Hey, you change your bank account.
224
:That's just little things like that.
225
:So there's a lot of security awareness training and there's also phishing training.
226
:So, you know, like we send phishing emails to our clients and then we see who falls for
them.
227
:And if they fall for them, then we have conversations with either that individual or with
the employer.
228
:If a lot of people are falling for it and doing some additional training and there's
nothing, everyone's busy.
229
:There's nothing that doesn't make somebody a bad person or lazy or stupid for make for
falling for this stuff, because everybody's really busy and they're, know,
230
:you get an email from a name you recognize, you may not have the time to look deeper, but
you have to at this point.
231
:Yeah, unfortunately.
232
:Definitely are these trainings that your company provides or you guys just provide a
resource?
233
:So we actually, so any of our clients, provide a base level of training.
234
:Actually any client or any, really any company we engage with, even if they don't hire us,
we still provide them with a training portal for their employees.
235
:Just for, it's a once a year training.
236
:For the, for our clients that want more, we provide where there's weekly micro trainings,
little 30 second trainings once a week.
237
:And then in addition to that, the phishing simulation where they're receiving emails that,
you know, that we're generating that
238
:that they can then either fall for or not.
239
:And we get a report back, who clicked, who entered data, and that's a great tool for
seeing who needs a little bit more, a little more training.
240
:I know and I just love that.
241
:It's awesome that you guys do that for people and for companies.
242
:And then, know, many small to mid-sized businesses think they're not targets for cyber
attacks.
243
:Why is that a super dangerous mindset?
244
:Because who is more susceptible to being compromised?
245
:You know, a small business that has no professional IT staff, may be working with a
company like mine or their IT might be the receptionist's boyfriend after work type of
246
:thing.
247
:And they're not devoting any resources to training.
248
:They're not devoting any resources to more advanced cybersecurity solutions, firewall
solutions versus a large company.
249
:You know, a large company has, they have somebody that maybe probably has 30 years
experience like myself as their chief information officer.
250
:They have a chief security officer.
251
:have, you know, all these different levels and IT manager and staff plus the budget to,
you know, to really, you know, to properly back things up, to properly secure, you know,
252
:secure the infrastructure.
253
:And, and those companies even get compromised, but it's much more difficult versus the
small business.
254
:That is who the majority of the compromises are against.
255
:You just don't hear it because, you know, when MGM got compromised because someone in the
help desk made a mistake, was that affected stock price.
256
:That was international news.
257
:When, you know, a small business in Las Vegas or Florida or wherever gets compromised,
one, they're embarrassed.
258
:They don't tell anybody.
259
:They don't know, you know, oftentimes, even though legally they're supposed to.
260
:But it's not going to be news.
261
:So even if they report to the state or to Health and Human Services, it's still not going
to be front page in the paper unless it's a really egregious, you know, something really
262
:egregious happened.
263
:So those are, you know, the businesses that get compromised the most because they're the
ones falling for one of the simple phishing emails that are still written in bad English.
264
:And for those emails, there, is there something that, know, companies like words or
something that they should see?
265
:I know you did mention like, you know, maybe it was, it looks like that email, but maybe
instead of like dot CNN or dot com or whatever, but is there words or anything like you've
266
:found that, you know, these people that are doing this that they possibly use?
267
:No, so it used to be that you knew right away that it was bogus when it started with
greetings of the day.
268
:You know, it's not someone from the United States.
269
:No one speaks that way in the US.
270
:So but now those people are able to just type that up in chat GPT and say, please, you
know, please correct the grammar, you know, and put and translate this into American
271
:English and chat GPT will make it perfectly, make it sound.
272
:like me or you would write.
273
:So there's really nothing, there's no language that the bad guys are going to use because
depending on what business they're targeting, it's going to be completely different.
274
:If it's a medical practice versus a low voltage contractor, that is something that is a
problem.
275
:They're going to be able to use it to make sense to the person that they're targeting.
276
:got it so you know we may be using chat gbt or an ai software for you know a positive
resource but they're using it in a negative way
277
:No, and that's in keep in mind now you can actually like images built into the Samsung
Galaxy phones.
278
:I can actually call you and speak to you in any language that exists.
279
:And I could be speaking.
280
:I'll speak English and you'll hear it in whatever language that I've asked for it to be to
be it.
281
:And it's on the fly.
282
:And then when you respond back to me, it's going to translate that into English.
283
:And so we're going to have a two way conversation without
284
:those awkward silences and it will be natural.
285
:So now you've got people from anywhere in the world that can have conversations with
people anywhere in the world and pretend and use any voice they want.
286
:So you have, you know, people that, you know, this actually knows some people that this
happened to, but they get a call saying, Hey, we've got your kid, you know, pay X dollars.
287
:because they know based on they compromised someone's account or based on social media,
they know that that person happens to be on vacation in Mexico.
288
:So now they call the relative saying, we've got your kid or you got your grandkid,
whatever the case might be.
289
:then they, suppose they put them on the phone real quick and all they did was they took a
couple of snippets of their voice, put it in the AI, typed what they wanted to say.
290
:And there's no way to distinguish that.
291
:from reality.
292
:It's something that's, as you said, that can be fearful, but we just have to protect
ourselves.
293
:Yes.
294
:And so.
295
:And the other thing is people pretend, people call businesses and pretend to be their MSP.
296
:They pretend to be, so they can say, hey, I'm calling, because they can fake the phone
number that the caller ID shows.
297
:And they can even fake the voice.
298
:So we're actually implementing verification software.
299
:So soon, our clients will be able to verify us just like we verify our clients.
300
:Got it, and I'm sure that's very important, the times that we're currently in.
301
:We did talk about AI, the threats that on the rise.
302
:Is there a way that businesses should adjust their current security strategies?
303
:Really, it's all the same things.
304
:The only other thing I would say is that now you have to verify who you're talking to even
more.
305
:So never wire money based on an email, in all reality, or a text message.
306
:Actually call the number that you have for that person or for that company and put in
their extension number in order to talk to them to actually get wiring information.
307
:So this is an area where businesses are getting hit a lot, whether they're buying a house
or they're...
308
:you know, starting a construction project and they're wiring money.
309
:You cannot trust what you get from people.
310
:You just via email or even just if they call you, you don't necessarily know that's the
real that's the real person.
311
:I would call back and don't call the number that's in the email.
312
:Call the number that, you know, is either on the company's website or that you have in
your contact records.
313
:Beyond that, again, training, you know, advanced security products and,
314
:I didn't mention earlier, patching all the computers.
315
:That's another area where people don't, they'll get compromised because their computers
are running Windows that has vulnerabilities that should have been patched two years ago.
316
:Still unpatched.
317
:Well, you just make yourself low hanging fruit just by browsing the internet.
318
:You are potentially compromising your organization.
319
:Thank you so much, Leo.
320
:And what exactly does an NSP do and why should businesses consider working with one?
321
:So managed services provider, it's the new name for IT consulting.
322
:And the main difference between regular IT consulting, what used to be IT consulting and
managed services is our job is to keep the customer up and running.
323
:And instead of getting paid per hour, when the client has problems, our job is to prevent
those problems in the first place.
324
:So they're paying us per month, typically per user or per computer per month.
325
:our responsibility is to make sure that they don't have to call us.
326
:So that's the ideal situation with MSP environment is the customer almost never has to
call us unless it's for good stuff.
327
:And we don't have to drive out for emergencies.
328
:And that becomes very profitable for both us and for our clients because if we do the
right thing and they don't have problems, they get to do their business.
329
:They get to do their job and they're not wasting time talking to us.
330
:And
331
:if we find that we're seeing the same problem over and over and over again from multiple
employees in the same organization, then it's really behooves us to figure out how do we
332
:solve those problems so they stop calling.
333
:So it's really, it's selfishness that really works for both sides of the equation because
they don't want to call us.
334
:They want to do their job.
335
:They're busy.
336
:They're oftentimes understaffed and then talking to us takes away from what they need to
do.
337
:So if we can really do our job properly and keep them up and running and not
338
:having problems and not getting compromised and those types of things, then it makes it
much more profitable for us.
339
:It makes it a more interesting job for us because we can be working kind of on the next
project to make them more efficient, to utilize technology better.
340
:And we're not having to deal with the monotonous, I can't print, I can't print, I can't
print.
341
:If you hear that from 10 clients every day, that's just not fun.
342
:Just from a
343
:you know, from a, you know, IT job perspective.
344
:The other thing is in a smaller companies, they can't necessarily afford good IT staff.
345
:So if you have under a hundred employees, you probably shouldn't have a full-time IT
person because that IT person is going to get stale in that environment.
346
:They only see that environments.
347
:They don't know what else is available out there.
348
:And then also that person gets sick and goes on vacation once in a while.
349
:So then what do you do?
350
:Now you have to have a firm.
351
:that you can contract with.
352
:And then what happens with an IT person leaves and finds a different job or gets hit by a
bus?
353
:So now you have all your eggs in one basket versus when you work with an MSP, we don't go
on vacation.
354
:You know, we have, we don't, can't do a company retreat just closed for a week because our
clients depend on us.
355
:So we're always available and we have people, have someone available on the weekends.
356
:We have someone always available for our clients.
357
:So that's really the main difference.
358
:Now for larger companies, they may want to work with an MSP and have staff.
359
:And we have a number of clients like that where we do the more complicated projects or,
you know, if they run into situations that they can't handle, then they escalate it to us.
360
:And then they also oftentimes use our tools to manage their environments.
361
:And then if they have big projects and they don't have enough manpower for, you know, they
want to roll out a couple hundred computers.
362
:Well, IT staff can do it, but it'll take them potentially a couple of months versus
363
:They can contract with us.
364
:We come out and we will get it done with them in two weeks.
365
:Got it.
366
:No, that totally makes sense.
367
:So I get it.
368
:And maybe what should a business look for when they're trying to choose an MSB?
369
:So there's a million on these MSPs out there.
370
:Some are small as one person working out of their house.
371
:Others are huge public companies.
372
:It's really based on your type of business.
373
:Who do you want to work with?
374
:You want to work with someone that's local, someone for whom every client is important.
375
:So it's that the size.
376
:If that MSP has one employee,
377
:you're very important, but they may not have the resources to properly support you.
378
:And then do they have the tools?
379
:Can they afford the tools?
380
:Do they have cyber, you know, cyber insurance?
381
:Because that's an area where, you know, we maintain cyber insurance because no one's in to
help.
382
:And if we get compromised, then potentially all of our clients can get compromised.
383
:But if any one of our clients gets compromised because of something we do,
384
:that's potential lawsuit, which we really, really want to avoid.
385
:But if we didn't have insurance, then they're not going to get that much.
386
:They're not going to be able to really become whole again.
387
:So every MSP we work with should have cyber insurance and be able to prove it, could have
tools for verifying the end users that are calling and really having enough expertise in
388
:their industry in order to properly support them and having that security focus.
389
:And then when it comes to the type of client that you're looking to work with, what does
that look like?
390
:For us, is, you know, we specialize in a few different industries.
391
:You know, we have deep specialization in healthcare.
392
:So we've been working in healthcare for a very long time.
393
:Really understand HIPAA and the requirements for that practices need.
394
:Also construction engineering and architecture firms.
395
:You know, we've been working with those folks for a very long time and understand the
industries, understand what they need, their software tools, and then other professional
396
:services organizations like law firms, CPA firms that
397
:need to be up and running because they're really their business depends on their computers
functioning, especially like for CPAs during tax season.
398
:And there's regulatory, like CPAs are now governed by some regulatory requirements that
they have to, because they have tax information, have, know, social security numbers.
399
:There's a lot of data, just like healthcare, that they have of their clients.
400
:So it has to be secured.
401
:And there's both federal and state laws that govern those things.
402
:So we really understand that.
403
:But the other caveat,
404
:We want to work.
405
:We don't want to work with companies, no matter how much they pass, if they don't value
what we do for them.
406
:So for us, it's important that it's a partnership.
407
:Our job is to keep them up and running.
408
:And their job is to listen to our recommendations.
409
:They don't have to do exactly what we say, but they at least need to listen to our
recommendations and understand why we're making those recommendations and not just say no
410
:because they don't want to spend the money.
411
:So if they're not willing to
412
:invest in their own business to keep themselves secure.
413
:At this point, our policy is not even to engage.
414
:So they have to be able to maintain a minimum level of security for us to even consider
working with them.
415
:So someone that doesn't want to do the cybersecurity, know, know, softwares that at a
minimum we recommend, we just can't work with them.
416
:Someone's not going to do data backup.
417
:It just doesn't make sense for us to work with them because we're risking our reputations
if they get compromised.
418
:And in healthcare,
419
:If they get compromised because we didn't do what's really required, we can be fined by
Health and Human Services.
420
:And I'm not really willing to be fined and risk my business based on somebody else not
wanting to spend budget on critical things.
421
:Got it.
422
:No, and that's super important.
423
:No, and I totally understand.
424
:We're in the same, I totally get it.
425
:mean, cabling's cabling, of course, but I know I totally understand what you're saying.
426
:And then when it comes to, you know, what are some of the challenges that MSPs face when
working with clients who don't prioritize cybersecurity?
427
:I mean, the clients are prioritizing some security.
428
:just not working with them.
429
:So it's not it was a problem because, you know, we were trying to kind of fight that good
fight, but we were losing because if we know there are clients, we're not their boss.
430
:They're our boss.
431
:But as as the employee or the contractor or the consulting firm, we have the ability to
decide who we work with.
432
:And we're working with those that, again, value.
433
:what we're trying to bring to the table.
434
:The challenges for us now really is maintaining a good staff on our end because all costs
are going up.
435
:you know, all costs over the last, you know, you know, the last four years was the costs
went up tremendously, you know, during COVID and after and, know, and they're still going
436
:up, maybe not as fast anymore, but they're still rising.
437
:The tool costs, because we're finding that we have to add additional tools.
438
:to our repertoire and we don't necessarily pass it on to our clients.
439
:So, you know, staying profitable while doing what we need to do is a challenge.
440
:And just, you know, again, really making the clients understand that, hey, this is there's
a reason why we say, know, yes, it's inconvenient to do multifactor authentication.
441
:It's terrible.
442
:I have to look at my, you know, authenticator app a dozen times a day.
443
:It's extremely inconvenient.
444
:critical because without that, pretty much, you know, it's like leaving your door unlocked
or even cracked open in a bad neighborhood with expensive stuff on the inside that people
445
:can see.
446
:So you just, that's just a bad idea.
447
:Now you could do that for a day or two and you might not get burglarized, but you might
get burglarized in the first 15 minutes.
448
:Your guess is as good as mine.
449
:So we just have to not, you know, pray.
450
:We just have to actually do the right thing.
451
:it.
452
:Now that makes total sense.
453
:So would you say in the making music, you it's not really something that you guys had
dealt with in the past?
454
:Would you or not you're not dealing it with it as much?
455
:Do you feel like maybe you guys became more, I guess, better at educating your client?
456
:And that's why you're currently not dealing with it as much?
457
:No, I think we just become more mature and as a business and gotten to the point where
we're just not going to work with people that don't fit into, you know, into our, you
458
:know, ideal client kind of scenario.
459
:If somebody's not willing to do what, you know, what we ask them to do, there's one of two
things.
460
:If they're a good client otherwise, we'll make them sign a declination of service, you
know, form where they're saying, yes, we've formed them about
461
:how critical this is, they've said no, they've declined, and they're willing to assume the
risk themselves.
462
:Because now they are acknowledging they've been told.
463
:Because if you just have a conversation with somebody a year later, that person may no
longer be there, or six months later, and the person that replaced them is going to blame
464
:us, even though they declined some of those critical services.
465
:So that's
466
:Either so that's the one scenario.
467
:The other scenario is if it's serious enough, we'll just say, you know, thank you for your
business, but we're going to have to help you transition to somebody else that may not
468
:care about these, you know, security as much.
469
:And we're willing to do that versus, you know, five years ago, six years ago, we were
smaller.
470
:We had fewer resources.
471
:We may not have been willing to do that as much because every client, you know, every
client's important, but
472
:losing certain clients could have been, you know, very detrimental to business.
473
:Now, no one client is, you know, is that big of a percentage of our revenues to where, you
know, we have to worry about that.
474
:And it's more important for us that the clients do the right thing, that we do the right
thing for the clients than to keep the client.
475
:got it and Leah, totally actually understand exactly what you're saying.
476
:I feel like we're at the same place as well, which it's a great feeling when you don't
actually have to depend on a client to eat or be able to feed your employees.
477
:So I do think that's actually a really good feeling.
478
:And the other thing, the clients have to communicate.
479
:What I hate is getting the phone call, hey, you know, we ordered a bunch of copiers and
they're here and they're going to take away our old ones.
480
:Can you guys come out and set them up?
481
:It's like, wait, copiers?
482
:He's like, why didn't we have this conversation?
483
:Because we don't charge our clients hourly.
484
:You we're not attorneys.
485
:We don't charge every 15 seconds or 15 minutes.
486
:It's, you know, question one, you copier.
487
:Give us a call.
488
:We'll review the options and say, yes, this company is good.
489
:This company is bad.
490
:This one's not going to do what you need it to do because that's our job.
491
:And then, you we plan for good transitions.
492
:When we get those calls last minute, one, we're having either they're going to have to
wait for us if we have a lot of other appointments or if we're having a busy day or, you
493
:know, or if it's really critical, we may have to put off somebody, you know, some other
client because of the poor planning.
494
:that
495
:Communication is really important.
496
:Getting a phone call, hey, we're moving our office next week.
497
:Can you guys come out and help with that?
498
:Okay, what about internet?
499
:Do you have internet?
500
:Oh, can you guys set that up?
501
:Well, no, we can't get fiber internet for you in a week.
502
:None of the internet providers will move that fast.
503
:We need 30 days.
504
:Those types of things, that's what makes a good client, it's that proper communication.
505
:They need to reach out to us when it's appropriate.
506
:We need to reach out and inform them about things when it's appropriate.
507
:That two-way communication, just like in any relationship, whether it's an
employee-employer, whether it's a relationship between spouses or boyfriend-girlfriend,
508
:kids, whatever, there has to be that communication.
509
:Otherwise, you end up with problems.
510
:Yeah, no, totally.
511
:Very, very true.
512
:And then how, what are some misconceptions do businesses often have about MSPs and how
have any of those changed in the recent years?
513
:I mean, you know, every everyone has their own misconceptions or some just think that
we're just trying to sell stuff and selling stuff is such a small part of our business
514
:that honestly, we just don't care.
515
:You know, whether you buy computers from someone else or from us.
516
:Sure.
517
:You know, we prefer that you buy it from us, but we don't really care.
518
:What we care about is that you buy the right stuff.
519
:So who you buy it from is it really is a role.
520
:Beyond that is that there's a major, think the biggest misconception is that just because
you have an MSP that they're handling all of your cybersecurity, your HIPAA compliance,
521
:that they're handling everything.
522
:Unless it's specifically stated, they're not.
523
:so when we get, oftentimes we're asked to fill out cyber insurance paperwork for our
clients.
524
:One, I won't fill it out.
525
:I will look at it.
526
:I'll tell them what I think the answers are.
527
:They need to fill it out because if I fill it out, then I am almost I'm myself on the hook
that this is all true that they're doing that they are really doing those things.
528
:And oftentimes they think, well, you as long as as long as I have an MSP, I'm compliant.
529
:It's not true unless you actually do the things that you have to do to be compliant.
530
:So that's a big misconception as well.
531
:And we try to keep our clients compliant, but.
532
:We still have some few legacy clients that where we may not handle everything for them
like we would like to.
533
:And, you know, unless it's actually in our agreement, we're not doing it because, you
know, again, we'll recommend it if they say no.
534
:You know, get them to sign off saying that they know that they've been told.
535
:But, you know, that's something people really need to think about.
536
:And the other thing is that, I've got something, you know, cloud, you know, all my
software is cloud.
537
:You know, it's all, you know, other companies, we're compliant, we're secure because it's
not installed on a server in our office.
538
:Still, you know, you're still just as vulnerable as if you had a server in your office.
539
:Got it.
540
:Would you say with being on the cloud you're more at risk?
541
:No, not necessarily.
542
:Oftentimes you're less at risk for the, as far as data loss, because if you have a cloud
provider for whatever software, CRM or electronic health record system or practice
543
:management system, there's nothing that you're going to do is going to cause that server
that you're connecting to over the internet to be encrypted.
544
:So you're not going to get ransomware issues.
545
:there's a chance that the vendor could get ransomware if they're not properly managing
things.
546
:And we've seen that before, but that's not something that you have control over.
547
:What you have control over is if someone compromises your computers and gets the password
to that system and is able to exfiltrate all the data, you're still just as vulnerable for
548
:that as if it was on your network.
549
:So the uptime piece, you're not as vulnerable about as long as the vendor you've gone with
is a good vendor.
550
:But the potential for data loss,
551
:Because now anybody, when it's on your network, someone has to break into your system and
actually use your system to access it, or somehow get into your network.
552
:When it's in the cloud, anyone in the world potentially, if they have the username and
password, can now get in there, make changes, steal data.
553
:that becomes, reusing passwords becomes a really big issue, using poor passwords, or even
storing passwords in your browser.
554
:because clicking on a bad link, the bad guys get all your passwords immediately, literally
instantly.
555
:So not using a password manager makes being in the cloud less safe.
556
:it.
557
:Thank you for sharing that Leo.
558
:And then where do you see that the future of managed IT services heading on the next five
to ten years?
559
:So there's going be a lot more AI enablement.
560
:Our official intelligence, while there's a lot of bad things happening because of AI,
there's going to be a lot of good things.
561
:So you have AI involved with security.
562
:You have AI involved in service delivery.
563
:We're about to implement some AI tools to make communication with us better.
564
:So there's going to be AI phone agents, I think, are going to be able to solve a lot of
frontline problems for our clients.
565
:you know, so that they don't have to wait for our staff.
566
:So there's, can see a lot of what we're self-service where they're going to be able to
call in, they get verified, they can make a request and our AI will immediately handle
567
:that for them so that they don't have to wait for a person to do it.
568
:So it's going to speed up service delivery, going to make the communication better.
569
:All at the same time, it's also making communication more dangerous because the bad guys
are going to be using it to
570
:pretend to be us, to pretend to be our customers, to try to get us to do things that we
wouldn't otherwise do.
571
:So it's really the, it's going to be the battle of the AI.
572
:And this was, I think this is the decade of AI.
573
:This 10 years massive changes.
574
:I mean, it will continue indefinitely, but it's going to be absolutely massive changes in
every industry.
575
:No, I totally I can totally see that.
576
:And that was actually coming into my next question is how do you think AI and automation
will impact the role of MSPs and cybersecurity trust strategies?
577
:So again, really the same answer.
578
:It's, we're using AI tools that are getting better and better and better at spotting
malicious activity.
579
:And at the same time, there's AI tools that are going to be used to try to do that
malicious activity.
580
:literally you're going to have Skynet battling, you know, Skynet, know, Earthnet, you want
to call it.
581
:So it's just going to be, it's going to be the battle of the AI, the AIs with
582
:humans that are needing to look at, you know, look at when AI flag something, you know,
you're going to need to look at is this legit?
583
:Is this not legit?
584
:Yeah.
585
:So there's going to be a lot of, you know, a lot of human intervention that's going to be
needed, but the AI tools are going to be doing a lot of the heavy lifting, least on the
586
:front end, both on the bad guy side and on the good and on the good guy side.
587
:Got it.
588
:that's something for you know, for us to think about Leo if someone's What like what would
you like to share with our is there anything else that you would like to share with our
589
:audience before we go?
590
:You know, I think we've covered just about everything.
591
:Really, it's a matter of staying educated, staying on top of what's out there, not being,
not trying to save, risking a million dollars by saving a dollar.
592
:So that's really important.
593
:But then also knowing you don't have to buy every tool that's being sold.
594
:It's really a matter of covering your bases, properly training your employees, having
processes in place.
595
:You know, if the CEO emails a CFO and says, hey, I need you to wire, you know, half a
million dollars to this new vendor, it needs to get done today and I'm hopping on an
596
:airplane, you know, email me when it's done.
597
:No, you have to have a process in place that that would never happen, you know, that that
would be a phone call.
598
:That would not be, you know, that would be a phone call with a callback with some kind of
a pin, you know, just there has to be processes and checks and balances.
599
:for everyone to protect themselves from the corporate level all the way down to the family
level.
600
:You get that call that, we got your kid here.
601
:to them for a second.
602
:There needs to be some kind of a real code that you know that's really them.
603
:It's not someone that is using AI to make it sound like it's them.
604
:Got it, no, I get that.
605
:Thank you so much today, Leo.
606
:It was a pleasure.
607
:If someone is looking to connect with you, how do they do so?
608
:So they can email me at leoB at htsfast.com.
609
:That's Henry Tom Sam and the word fast.com.
610
:The website can be reached by htsfast.com as well.
611
:That's really, you know, look me up on LinkedIn, look me up on, you know, on the web and
would love to talk to just about anybody.
612
:We're also looking to for companies that are in business friendly states in the United
States that are in managed services that are looking potentially to
613
:Either get out or sell.
614
:looking for smaller MSPs that would like to join a larger team.
615
:Awesome.
616
:Well, thank you so much, Leo.
617
:We'll be sure to put that in the description and everyone have a good day.
618
:Thank you so much.
619
:Thank you very much.
620
:Have a great one.
621
:you too.