TechJournal, October 2020

What's New

If you haven’t been keeping up with my videos, you can get an archive of all videos here

Let me know if there is a specific topic you want me to talk about.

We have a few new things coming up this month, including a credited course through TX Society of CPAs about IT security.

If you’re a CPA practice you don’t want to miss this!

Here’s link to get more details:




October 2020

This monthly publication provided courtesy of Nadeem Azhar, Owner of PC.Solutions.Net

Our Mission: To build a community of successful-minded entrepreneurs that inspires excellence, encourages collaboration and expands the capacity of all members to achieve great things.



The #1 Mistake Your Employees Are Making Today That Lets Cybercriminals Into Your Network

We all make mistakes. It’s a fact of life. But as we all know, some mistakes can have serious and lasting consequences – especially when it comes to business, cyber security and the constant cyberthreats that are out there.

While some businesses have invested heavily in cyber security, many have not. When it comes to network and data security, one of the most vulnerable areas of the economy is small businesses.

More often than not, small businesses simply don’t go all-in when it comes to IT security. Some fear they don’t have the budget and worry that IT security is too expensive. Others don’t take it seriously – they have an “it will never happen to me” attitude. Then there are those who invest in some security, but it’s limited and still leaves them vulnerable in the long run.


But there is one area of IT security where every business is vulnerable. You can have the greatest malware protection in the world and still fall victim due to this one big mistake.

Your employees lack IT security training.

It’s as simple as that. When your team isn’t trained on IT or network security and they aren’t aware of today’s best practices, you open yourself to major risk. Here’s why: We make mistakes.

Scammers and cybercriminals have the most success when they are able to trick people or play on the emotions of their victims. One common emotion they use is fear.

No one likes to get a message telling them that their bank account has been compromised. This is how phishing e-

mails work. The scammer sends an e-mail disguised as a message from a bank or financial institution. They may tell your employee that their account has been hacked or their password needs to be changed immediately. They use fear to trick them into clicking the link in the e-mail.

So, concerned about their bank account, your employee clicks the link. It takes them to a web page where they can enter their username, password and other credentials. Sometimes it even asks for their full Social Security number. (Scammers are bold, but people fall for it!)

As you guessed, the web page is fake. The link in the e-mail directs your employee to a page that allows the scammer to collect their data. Some thieves use it to access their bank account, but others sell the information for a quick buck. No matter the situation, the information has fallen into the hands of crooks.

The challenge is that phishing e-mails have gotten harder to spot. Scammers can spoof legitimate web addresses. They can make fake e-mails look like the real deal. But there are still plenty of minor details that indicate the e-mail is a fake.

This is one of the MANY reasons why comprehensive employee IT training is so important. Training helps employees identify red flags. But more than that, it helps them identify changing red flags. For instance, a phishing e-mail from 2010 looks nothing like a phishing e-mail from 2020.

“Your employees are your first defense against outside cyber-attackers.”

Scammers stay ahead of the curve. They know the trends, and they know how to adapt. Your employees also need to know the trends and need to be ready to adapt.

Good IT training covers much more than phishing e-mails. It helps your employees identify security red flags across the board.

These include:

· Phishing e-mails and phone calls

· Poor or outdated passwords

· Malicious software hidden in links, attachments or online ads

· Poorly configured security on employee devices (a big deal for remote employees!)

· Lack of guidelines related to Internet or social media usage on employee devices

· Outdated software or hardware

Good training is also continuous. Cyber security training isn’t a one-and-done deal. It’s something you do every quarter or twice a year. Just as you keep your business’s equipment maintained, you have to keep your employees’ cyber security knowledge maintained. After all, your employees are your first defense against outside cyber-attackers. When they know what they’re dealing with, they’re better equipped to stop it in its tracks and protect your business.

The bottom line is that a lack of training is the biggest threat against your computer network and the health of your business. You need to have a strong training program in place to make sure your employees stay up-to-date. But you don’t have to do it yourself. We can help. Along with your team, let’s protect your business together.  



Free Report Download: If You Are Considering Cloud Computing For Your Company, DON’T, Until You Read This…

intro to cloud computingIf you are considering cloud computing or Office 365 to save money and simplify IT, it is extremely important that you get and read this special report: “5 Critical Facts Every Business Owner Must Know Before Moving Their Network To The Cloud.”

This report discusses in simple, nontechnical terms the pros and cons of cloud computing, data security, how to choose a cloud provider and three little-known facts that most IT consultants don’t know or won’t tell you about cloud computing that could end up causing you MORE problems and costing you more money than you anticipated. Even if you aren’t ready to move to the cloud yet, this report will give you the right information and questions to ask when the time comes.


Get your FREE copy today:



Line of Defense

As security threats proliferate and new attack vectors are created by the bad guys, the good guys are also hard at work protecting systems and coming up with new ways to block attacks. Here’s a simple list of what you want to make sure you have in place:

Update Policy

Password Policy/MFA

Physical Access Policy

Intrusion Prevention System

Breach Scan

User Training

These six things will make you a very difficult target, we see even 3 of above items implemented properly will cause bad guys to move on to an easier target.

Note that many times when considering MFA people often forget about the weakest link, the users machine itself!

Does cloud computing make you any less safe? Get the facts


What Makes A Leader Successful Today?
Intentionality And The 3 Shifts

Have you ever wondered what one thing all successful leaders have in common? First, consider what all unsuccessful leaders have in common: they lack focus.

Either they aren’t clear on what they’re trying to do or they know what they need to do but aren’t doing the right things to achieve their objectives. Both waste money and resources and leave organizations stuck in the status quo.

This affects leaders regardless of the size or type of organization, and that’s why I wrote The Intention Imperative: 3 Essential Changes That Will Make You A Successful Leader Today.

What all great leaders have in common is intentionality— being crystal clear on what you’re trying to achieve and taking the right actions every day to achieve it.

Why do many business leaders lack clarity?

1. They inherited an unclear vision or never had one to begin with.

2. They value operations over objectives — doing things without questioning why.

3. They were distracted by problems, or even opportunities, which took them off course.

4. They were unwilling or unable to look at what was consistently being done with a fresh perspective.

What are the symptoms and signs of a leader who lacks clarity?

1. Constant changes in focus or direction

2. Lack of momentum

3. Confusion among employees and
what to do

4. Many team members asking “Why?”

5. Frustration at every level

6. Inconsistent action or behavior

In my book, I explain intentionality and then share what I believe are imperative changes


leaders need to take today to succeed: the shift from structure to culture, from motivation to inspiration and from experience to emotion.

Imperative 1 – Culture

“Culture is what we think and believe, which then determines what we do and what we accomplish.”

In The Intention Imperative, I teach the five levers you have for creating and maintaining the culture you desire. Creating it is the job of a leader.

Imperative 2 – Inspiration