TechJournal, November 2021

Peer Groups

No it’s not just you, I haven’t been making videos as often as I should.

I know when the pandemic first hit one of the commitments I made was to make multiple videos on a weekly basis and last couple weeks I’ve only done the Chat with Mack videos.

Well my dad was in the hospital and then he passed away and things just weren’t the same.

However, I will get back on the horse and start doing three videos a week as before.

Thanks for holding me accountable everyone.




November 2021

This monthly publication provided courtesy of Nadeem Azhar, Owner of PC.Solutions.Net

Our Mission: To build a community of successful-minded entrepreneurs that inspires excellence, encourages collaboration and expands the capacity of all members to achieve great things.



cyber security

 The Easiest Way To Disaster-Proof Your Cyber Security

Though no one would dispute the increasing prevalence of cyber-attacks on businesses in recent years, many small-business owners believe themselves and their business to be immune to such attacks. Broadly speaking, many small-business owners are likely to think that cybercriminals will go after the bigger fish. However, the fact of the matter is that cyber-attacks are crimes of opportunity, and small businesses often have access to a good amount of sensitive data without many major safeguards. In other words, they’re low-hanging fruit, ripe for the picking. 

Back in 2019, two-thirds of respondents to a survey about cyber security didn’t believe that their small to mid-size business (SMB) would fall victim to a cyber-attack. Consequently, only 9% of respondents said cyber security was a top priority for their business, and 60% didn’t have any sort of plan for deterring a cyber-attack. All of this,

despite the fact that, according to a report from CNBC, SMBs endured 43% of reported cyber-attacks, and according to data from the Ponemon Institute and Keeper Security, 76% of SMBs in the U.S. alone reportedly endured a cyber-attack within the previous year. 

Every small-business owner should have some plan for deterring cyber-attacks so they don’t end up as another statistic. Here are a few strategies for keeping the cybercriminals at bay. 

Boost Your Cloud Security
Storing data in the cloud is easy and cost-effective, but you should take care to find the most secure cloud storage platforms. Not all cloud platforms make security a priority, but some do. A few of the top-rated, most secure cloud platforms, according to, include, pCloud and Icedrive. 

Secure All Parts Of Your Network
Our computers and the many smart

devices hooked up to our network can become weak spots for hackers to get in. Taking steps to safeguard each device in your network with strong passwords and robust authentication measures will go a long way toward keeping the hackers at bay. In fact, one of the most basic security measures you can take for your network is to restrict access to your WiFi with a strong password. 

Invest In Extra Security Measures
Virtual private networks (VPNs) and firewalls are tools that are highly effective in protecting against cyber-attacks, even if they can’t prevent 100% of them. 

Pay Attention To Updates And Upgrades
When you get notified that one of the technological tools that you use has a new update, it’s easy to ignore it. However, you should commit to regularly updating and upgrading these tools because developers will often add patches to their programs that make them more secure against attacks with each update. So, it behooves business owners to regularly install updates for their tech tools. 

Back Up Your Data
With one of the most common forms of cyber-attacks being ransomware attacks, where hackers will hold your company data hostage until you pay them a ransom amount, having your company data stored on multiple

“76% of SMBs in the U.S. alone reportedly endured a cyber-attack within the previous year."

backups can ensure that your business won’t crumble due to your data’s inaccessibility. 

Limit Employee Access To Your Network
As much as we’d wish it were true, many cyber-attacks don’t come from outside of your company. Instead, they originate from within. If you want to limit the amount of damage that someone inside your company can do in a cyber-attack, the best course of action is to limit their access to different parts of your network. 

Train Your Employees
At the same time, just as many cyber-attacks occur not because of an employee’s malicious intent, but because of their ignorance. They click on a link in a sketchy e-mail and fall for a phishing scheme, volunteer their password info without thinking about it or choose a weak password for their computer. That’s why you need to dedicate time to training your employees on best practices when it comes to security. 

Set Up A ‘Security Culture’ At Your Workplace
You need to make cyber security a top priority, not just for your IT department, but for every department at your business. When everyone works together to protect their workplace from a cyber-attack, you have a better chance of actually succeeding. 

Will protecting your business from a cyber-attack require a good amount of time and money? Absolutely. Can you afford to ignore the prevalence of cyber-attacks any longer? Statistically, no. The sad truth is that 60% of SMBs that fall victim to a cyber-attack end up shuttering within six months. Don’t put yourself in that kind of position. Instead, take your business’s cyber security seriously. 

Free Report Download: If You Are Considering Cloud Computing For Your Company, DON’T, Until You Read This… 

If you are considering cloud cintro to cloud computingomputing or Office 365 to save money and simplify IT, it is extremely important that you get and read this special report: “5 Critical Facts Every Business Owner Must Know Before Moving Their Network To The Cloud.”

This report discusses in simple, nontechnical terms the pros and cons of cloud computing, data security, how to choose a cloud provider and three little-known facts that most IT consultants don’t know or won’t tell you about cloud computing that could end up causing you MORE problems and costing you more money than you anticipated. Even if you aren’t ready to move to the cloud yet, this report will give you the right information and questions to ask when the time comes.


Get your FREE copy today



We are getting more and more inquiries around procedures and some templates that you can use to create your security, DR and operational policies. This is part of what a CIO does and for those of you who are on our fixed cost outsourcing model already know how important written policies are for many entities involved in business; from insurance, to legal and HR departments.

Typically I see third parties, even customer clients asking them for such policies  and I do foresee in the future some government mandates similar to what we see in financial and health industries.

Remember, when a disaster strikes, that’s not the time to be thinking about disaster recovery. Policy should already be in place and all parties should be aware of the policy and chain of command. Remember, even in our fixed cost outsourcing program, the chief security officer still has to be an internal user of the company that has the authority to implement policies and hold users accountable.

Gone are the days of “I have a policy, It’s in my head” time to write it down and make it official!


Do You Have The Tools To Manage Effectively In The WFH World?

Gone are the days of managers wandering their office spaces, chatting with coworkers and spending time at the water coolers to get valuable information about the state of their teams. With the work-from-home life here to stay for many workspaces, managers must grow beyond their old ways of managing a work team in the office and get used to managing one effectively on Slack, Zoom and whatever other business platforms their company uses.  

I believe I have some insights I can offer any managers looking to meet their goals despite only ever communicating with their teams while sitting at home. These insights come in the form of five different questions that, if you answer them affirmatively, mean you’re probably an effective online manager. 

Do You Set Clear Goals For Your Team?
Unclear goals aren’t good anywhere, but at least in a physical office space, team members can clarify the goals with one another in person. That becomes a lot more difficult online, where means of communication can be limited to text messages. As a manager, make sure everyone on your team understands their goals.  

Are You Good At Hiring The Right People? 
When you hire someone who ends up not being suited for the job, it’s pretty easy to tell when you can monitor them at the office. However, if you hire someone for an online remote role, it can take significantly longer to find out if you’ve made a hiring mistake, meaning you’ll lose a lot more time
and money.

Can You Delegate Your Work Well?  
Delegating tasks in an office means that you can physically see if a team member is taking over those responsibilities. If they aren’t, you can always step in and do the project yourself. When you’re working from
home, however, you’ll need to give clear instructions and deadlines, while
following up regularly, in delegating tasks
to your team. 

Does Your Compensation System Reward High Performance?
In a remote context, the forces that push your team to perform at their highest ability don’t have as much of an impact. Since compensation and high performance are inextricably linked, a compensation system that directly rewards high performers is the only way that you’ll ensure that your team works to the best of their ability.

Do You Follow Through On Doing The Things You Say You’ll Do?
Building trust might not take a lot of work in the office, but in a remote setting, communication is key in building two-way trust with your team. When you say that you’ll complete a task, complete it – and make sure your team is aware. That integrity, even though you’re working from a place where no one can see you, will go a long way in building trust. 

Management beyond the office space doesn’t have to be a big mystery. If you want to improve your skills in managing remotely, many of our books, such as Power Score, Who and The CEO Next Door, can help you accomplish that.