How Outdated Technology Can Slow Down Your Business


How Outdated Technology Can Slow Down Your Business - Webinar


Mike Bazar: How's everybody doing? I'm going to share my screen here. We're bouncing things around here and trying to make sure I have all the right windows in the right places. So today we want to talk as everybody kind of is trickling in here about how outdated technology can slow down your business. I think sometimes as we talk about these things, people think that we're just trying to sell them stuff, know, everybody needs a new computer or whatever. That's certainly not the case. And we just want to kind of talk through the ups and downs and what it means to your business to have older, slower technology and why it's important to look at it by way of intros. My name is Mike Bazar. I'm the CTO and one of the partners here at Vector Choice Technologies.

Mike Bazar: That's a whole lot of stuff up there that basically says I'm a lifelong nerd. So I went to the Colorado School of Mines, got a degree in mechanical engineering, and then decided I wanted to tinker with computers and kind of started doing it around in August 2003 and then really made it into what I wanted to do in a company. And about 2009 grew that worked for a couple of other companies before I'd started this. And then just this year, Will and I merged our companies together, and so we merged my company, Bizarre Solutions, with Vector Choice. So now we're 50 partners in this new Vector Choice and moving forward, just looking to keep growing and helping as many small businesses along the way as we go.

Mike Bazar: So one of the things, fun fact about me is I would love to go touch every ocean and be on every continent. And so far I'm missing Antarctica and Australia. Almost got the Arctic Ocean a couple of weeks ago, but missed it by about 50 miles. Just didn't make it all the way to the Arctic Ocean, but we'll remedy that soon. So I've also got on the call with me, John Depero, who, John will probably do a bad job introducing you, but he's the wizard and the ninja of all things compliance. So he's our chief compliance officer. He absolutely knows, like, CMMC and other compliance. He's a member of the American Bar Association. He was in counterintelligence in the army. He has retired, but knows all kinds of things.

Mike Bazar: And occasionally we'll be having conversations and I'll say something I think, know, what about this? And he'll be like, I know how to do that from the background. And it's always interesting to know what Special Agent DePerro retired.

Jon DePerro: Retired, retired.

Mike Bazar: You can make the case.

Jon DePerro: I'm not doing retired very well, but I am anyway.

Mike Bazar: So John is an expert at looking through, like, contracts and other things and really looking at what do we need to do on a compliance perspective? And I have to say it's a very special role in terms of there's a lot of people out there who can look in an agreement and he can really help kind of boil it down to, as he likes to say, informed risk decisions, right?

Mike Bazar: Not that you have to do and spend and always go and figure out, but you need to know what the risk is, what the impact to your business is, what it's going to mean down the road in terms of compliance, maybe with your insurance policies, compliance with FTC safeguards, compliance with CMMC, if you're in defense industry, PCI, HIPAA there's all these different things, and a lot of the time, businesses just don't know that they don't need to be compliant or that they aren't compliant. So John certainly helps us sort through that with customers as we go through that. And then Bo Dickey is on as well. Bo is our chief security officer. So he's got over 20 years in security operations, law enforcement.

Mike Bazar: And so Bo fits into the same thing, where I'll say something and then he comes back and says, you got to think of it from these seven things from a security perspective or the back end or kind of the criminal mindset, maybe, of this is what they might be doing. So this is why you don't want to do that, or we need to do this. And so Bo is over our sock and helps make sure that we do everything the way we should and filter everything through that security lens, which becomes a big deal. And again, the reason why as we go through this, you might be thinking why do we have the security and the compliance guy if we're talking about technology and how old computers can impact that.

Mike Bazar: And really we're going to talk about that and more as we kind of go through those. So you can connect the dots and understand that a lot of the time we say, hey, let's upgrade or replace this computer, this server, this software. It's not just because we want to sell you something, it's because we want to help you stay compliant, secure, prepared for the future, those kinds of things. So a little bit of quick about us and I kind of breeze through this, but I just think it's important to kind of who we are. So you know that we're talking from a point of totally blanking on words here, but a point of authority in the subject and what it know. So Vector Choice been around for a bunch of years. Like I said, we've recently merged on the executive team.

Mike Bazar: We've got Will is the CEO who's not on the slide for some reason. And then we've got myself as the CTO, sarah is our COO. John, as I said earlier, is our compliance officer and Bo is security officer. And then we've got the rest of our management team. Jake is over business strategy, troy is our VP of marketing, john is VP of Technical operations, gabby's over finance and emma and Sarah in marketing. As you know, the point is we're building, growing, constantly evolving this thing. I think we have a really good set of expertise that we put together that we try to then use to bring to all of our customers, which is reflected in some of the awards and other things that we've won. Right?

Mike Bazar: So we've been on the MSP 501 list, ink 5000 list, atlanta's Best and brightest, some Ink regional list. So again, it's not necessarily toot our horn as much as we know what we're talking about. We've been growing and doing great things in what we're doing, I think, and authority in the space. We have locations all over the place. I basically use this to highlight Mississippi and say if anybody needs help in Mississippi, we got to cover that white square up as we keep kind of moving for USA dominance here. But we've got several offices spread across. We've served clients in over 23 states, plus worked internationally with people. So again, I think we've got a pretty good authority when we come into it. A little bit of what we do cybersecurity services, managed It consulting, we do security and risk assessments.

Mike Bazar: We have cloud consulting services, kind of day to day support services, really a lot of compliance. And it boils down to that last bubble there is as a service, there's a lot of things we can do either as a project or as a service. And these days as a service becomes more and more important because with compliance, with security, with It's an ongoing thing. It isn't just, hey, I bought a new computer and the process is done. There's a whole lot that continues to go on. And so that's a lot of what we do in focus is how do we help keep pushing people forward in this cloud connected as a service kind of world and everything else. Our process, if you want to work with us, we basically do a lot of meetings, initial meeting to uncover your needs.

Mike Bazar: We'll do a network assessment to really decide what that need is. Part of reason I put this up here even, is if you're shopping for an It provider, aren't sure about your It provider or talking about It. If they don't have a good solid process, that can be a problem. So we'll really do those network assessments to figure out what that is. Then we'll look at what is it going to take to do that initial work, do our onboarding implementation install, and then we kind of go back through a lot of this again, right? We'll go back and uncover more needs and redo network assessments and do this constant process improvement as we continue to go through, you know, just a shout out here a little bit. We will recently has the compliance formula.

Mike Bazar: You can scan that QR code and get it on Amazon. But if you've thought about how to do compliance and other things. Want some background and a little bit of insight. That's a great book to go kind of get you down that road. I think the moral of the story is if you read it, you'll probably go, this is a whole lot of things. I need help. And that's what we're here to do, is to help you through that process. So getting into the meat and potatoes of this and why everybody actually signed up for the Webinar was less to hear about us and more to hear about how technology and your business all impact each other. And like I said earlier, a lot of the time people think it's just, well, you're selling computers or yeah, we can't get it too old.

Mike Bazar: Well, let's wait till it's really slow. They've done some different studies and they update this all the time. But the last big one I saw is intel did a study that said if you replace your computer every three to four years, but in that kind of three ish mark, the performance gains that you get out of that will increase productivity enough that you'll usually pay for the computer cost in the next year of productivity gains. So if you look at something, you say, hey, how do I make my people more productive? How do we continue to push and do more if they're waiting on applications to open? And as they get more and more complex, they get slower and slower on those PCs. That's the kind of stuff we're looking at.

Mike Bazar: So old technology often is slow and outdated and it makes it hard for people to do their job. You'll have happier employees if they have better and faster computers, right? We deal with that a lot and we see that as we go in and replace computers for people that were maybe five, six, eight we've seen ten and 13 year old PCs that people love getting a new computer. It makes a lot faster. It can actually improve morale in the company if you have a good plan to constantly kind of replace computers and keep them up to date. The other thing we see a lot of, again, the second bullet is lost productivity frustrated people. That's the big thing, replacing them. And then newer software and hardware.

Mike Bazar: You can run into compatibility issues, especially when you start talking about Windows Ten and Windows Eleven and how does software work with those? You don't want people to lose productivity because their computers are slow. That is a problem. And as we look at remote work, as we look more at people working in different areas, this becomes a big deal. And Bo, you've probably seen some of this as well, is a lot of time we'll see we'll take over a customer, we'll roll out our new security software and the computers come crawling to a halt because they can't handle that new software. And so Bo, I don't know if you have any thoughts on that.

Mike Bazar: But that's one of those things that as this stuff goes on and this is the next slide, we'll talk about security risks, but you get that new software and it's doing more stuff than the old security software used to do.

Beau Dickie: Yeah, you run into issues where there's not enough Ram because the system can't be upgraded more or the processor is being bogged down because it's an older processor that doesn't match the new architecture. I mean, at the end of the day, if a system isn't running as optimally as it should when you add a larger workload to it that's running in the background, you don't see what's causing the issues. And sometimes it's because the hardware is old. The other aspect of it is that older hardware you can't get the security tools on there. In some cases it's old software that doesn't support the new requirements for some of the back end dependencies of software.

Beau Dickie: But all of those things are essentially a security risk because if you don't have the tools that are actively monitoring and providing the protection and security standards, then that system is now a vulnerability. It's a place for an attacker to go and hide without worry of being detected, to do whatever kind of damage they want to do, whether that's stealing your information, ransoming your systems, or impersonating your employees to force you to channel money out through ACH transfers.

Mike Bazar: Yeah, and one of the things I've seen in a couple of places is a lot of people go well, all my data is in the cloud. I don't need to worry about my local PCs or security or those kinds of things. And what I always say is that risk is still yours. Because if I can get on your PC as a hacker, I can do keystroke logging, I can capture data as you enter it or pull it out of your system if I can get access as you so just because your stuff is in the cloud and you feel like I can use older, slower computers because everything's in the cloud. There can be a real problem with that.

Mike Bazar: And one of the ones that we see with that specifically to hardware is Windows Eleven requires there's a chip set now, it's called TPM trusted Platform module, has to do with disk encryption and a bunch of these other kind of back end things that Windows does. That TPM chip has to be of a certain newness, a certain recent age or Windows Eleven won't run, it just can't. And that's what we see a lot of is it's not that a processor or the Ram can't handle Windows Eleven, it's that the TPM chips and those things are old. And then you start running into compliance issues because you can't encrypt data because you don't have the right TPM chip and HIPAA or PCI or whatever these other things. I don't you probably got something there to chip in know, I bring it.

Jon DePerro: Way down from Bo and Mike level. No one cares what a TPM chip is. Your insurance carrier said you got to encrypt your data. You just can't do it.

Mike Bazar: Right?

Jon DePerro: You just can't. It's not possible. Don't worry about chips and TPM and file vault versus BitLocker. Like, who cares, right? You made a business decision to manage risk, and one of the strategies for mitigating risk, financial risk, was insurance. Well, if the insurance is never going to get paid, why have the policy at all? That's how I come at it. Right, right. So everything Mike and Bo said is 100% true. I'm not discounting the technical validity of your statements, but the business function as a small business owner, what is the business function you're trying to achieve? Well, if my secretary dumps coffee in the file server, if a Russian hacker rans, whatever happens, insurance was a tool you selected. We're just telling you're not going to get paid because you said you'd have encryption and it's not possible.

Jon DePerro: And what I ask people to do is map these business functions to the technology. It's either going to support it or it's going to prohibit it. This is an example when technology is prohibiting you from achieving a business function. So let's have that discussion. Where are you trying to be six months from now, two years from now, right. And don't get caught with what I call operational surprise. Bo and I were on with a client. I'll make this real quick. Just this week, they're trying to pursue a government contract. That government contract, the qualifying packet says, are you using any end of life software or hardware? Well, they have a workload that's in a database that is multiple years out of date, but it works.

Mike Bazar: Right.

Jon DePerro: Going to that business owner, it still does what they needed to do, so they've never replaced it. But now they're sitting on multimillion dollar contract that they've been deemed not technically qualified to bid for because that database that actually doesn't have anything to do with the contract, but forces them to say on paper, yes, we use end of life software and servers. Yeah.

Mike Bazar: And I think that's the thing a lot of other side of this too, is we tend to talk about people think software, hardware, but even this can be networking stuff, right. The increased risk of data breaches if you have really old switches, they may not support virtual networking where we could do they're called VLANs, but again, basically, you're virtually separating traffic. One of the biggest heists that has ever happened in Vegas was because a hacker got into their network through thermostat control for a fish tank in the lobby. And so what we look at when we go in a lot of these things is we want to take old switches and get rid of them. Not because I'm trying to sell you stuff, but because we want to isolate the IoT devices, your thermostat, your cameras, your NVRs.

Mike Bazar: We don't want those touch the data on the network, the rest of it. So now we can separate those things, right. Same sort of stuff will happen with wireless. If you still use old types of encryption, that's really easy to hack now. And so you need something with WiFi Six and WPA Three and all these technical terms you don't really care about, but it's so that you can be more secure and keep your data secure. And it's getting to the point with a lot of this that it really is almost a selling point to customers. Right. There's a little bit of where people are numb to losing their data, and there's also some of it where they're just friggin tired of it. And so it is becoming more and more that you have to do it.

Mike Bazar: We're seeing different things like the FTC safeguards that came down just this year that impacts a lot of auto dealerships and legal firms and depends on how you deal with taxes and other things. In terms of CPAs, there's twelve categories or 15 categories, I forget, of businesses. But the point being there's this larger group now that normally didn't have any compliance standards other than PCI if they accepted credit cards or something like that now have to have these sets of safeguards. And some of that is data encryption and other things. And if you have really old technology, you can't do it. And that becomes a real problem. And we're seeing a lot of privacy laws come down as well. Like I know in Texas, it's the one I always cite because it's just easy.

Mike Bazar: And I'm in Texas, but if 250 Texans so it doesn't matter where your business is, 250 Texans are in your database and they have their data stolen. You're supposed to report that to the Attorney General's office, to the State of Texas. Well, what comes out of that could be an investigation. There could be other things they could find. You negligent in the way you're handling data. There's a lot of this stuff that comes out of it, and what we want to try to do is make sure you have the right technology to have the right standards in place that you can not worry about these things. And that's where a lot of people get hung up in this, is they just keep the old stuff and it still works back to that database, right? It works. It does what it's supposed to.

Mike Bazar: But at a certain point, it becomes a risk to your business and that becomes the real problem that you want to make sure you're addressing in a.

Jon DePerro: Reasonable and timely you know, I'm a car guy. You know me like anyone's met me in I'll start talking about cars within the first you know, Mike, as a business owner, you bought company vehicles, right? You have a regular maintenance schedule, you know about how long, based on depreciation and functionality, you had a goal for how long that car that you bought for the business would last. And then that car has tires. And we know those tires, they're supposed to last 50,000 miles, and we're probably not going to wait till we blow it out, probably at 45,000. Right. But we do that in business with stuff all the time.

Jon DePerro: The problem with it is we buy a tire that has a 50,000 miles rating, and then six months later, our state regulators come back and say, no tire can be used for over 20,000 miles. And they're like, well, why? Already bought the 50,000 miles tire? It is such a moving target right now with security, with compliance with all these standards. That's why it's so critical to at least have a map. If you've never defined how long you expect an It resource to last, how do you know if you've hit it or not? Part is just having a good partner, having a good account manager, someone to sit down with you and map out, when do we expect to start looking at replacing stuff and then have someone watching changes in your business to alert you to changes like the Texas law. Right.

Jon DePerro: Hey, bad news, Mike. We cannot with our current technology support this change. I see it all with insurance. Everything's good. We get your insurance good. You meet all the terms and conditions. Eleven months go by, you get a new insurance questionnaire, and there's five or six things that you no longer can click yes to. Yeah.

Mike Bazar: And that's one thing I would say, and I know that this is almost a compliance thing, but it falls into this, is if you have cyber insurance and you haven't looked at that policy recently, you should call your insurance agent when you're done with this call and see what the requirements are. Because that has changed a lot in the last six to twelve months because they all lost their shirts to cyber policies. They absolutely got cream because people had bad security in place, and they got just cream because people were using old technology, old cyber products. They weren't looking at the new stuff and adopting new methodologies around that. And that became a real problem and they just lost their shirts on it.

Jon DePerro: So two years ago they lost their shirts. So last year they raised rates and they made these questionnaires go from five questions to five pages of questions, right?

Mike Bazar: Yep.

Jon DePerro: I was reading a great article just two weeks ago out of England, but that cybersecurity payments have dropped for the first month ever payments fight. And the reason for that is not because there's less attacks. It's because those five page documents are being used to not pay premium, not pay claims. Right. They don't have to pay you because you said they asked an all question and you said well, we mostly do it. So you clicked yes, then you had a claim and they came back and said no. The question was all not 99%, not 90%, 100%. And so we're just not going to pay to claim.

Mike Bazar: Yeah. And to kind of keep on the technology side of this. That's one of the reasons we use a product that tracks governance and everything else is we're doing compliance pieces for people. And that falls into like two years ago, nobody was cared about the compliance standards per se. They didn't care. Well, John has always cared about them.

Jon DePerro: But I still don't care.

Mike Bazar: They weren't tracking like it wasn't things that it provider we're talking about now. We are because of all these things that are coming up where we have to start tracking it to prove that you're doing what you're doing. So again, it falls into this outdated technology. You have to track these things and look at them. We've got some other stuff we'll hit up here in a little bit, but to keep moving forward, just a couple of specific examples because everybody likes that. So in 2017, Equifax had a data breach. Over 143,000,000 people had their data exposed. And it came because there was outdated software that wasn't patched and there was a known vulnerability. Same thing happened in 2019 when there was a Marriott chain breach and then the Colonial pipeline, they had a ransomware attack and it was the same.

Mike Bazar: They were using outdated software. It wasn't patched. There was an old user that wasn't patched. They weren't using newer technology around sock and monitoring these logins and other things that would look for these systems to say, hey, this person hasn't logged in for six months and all of a sudden they just logged into the system. That might be a problem, right? And all these other technologies that are coming out around the security side, that's why we adopt a lot of those and keep pushing forward. Because all these hacks as they happen, almost all of them are happening because there's known vulnerabilities. There was the big one that happened that isn't even on here. There was a few years back where I forget which worm it was, but the WannaCry.

Mike Bazar: And it went across all Europe and it shut down like the health and the hospital systems in the UK and everything else. And it all attacked a known Microsoft vulnerability that wasn't patched on a whole bunch of computers. And so they had outdated technology, outdated patching, and that brought an entire country's hospital system to its knees because they didn't do the right patching, because they didn't keep the technology up to date. And so that's where all these things really start to come together. And you realize that not only do you need the right hardware, you need the right software, you need the right updates, you need all these pieces to be up to date or you end up losing out and oftentimes back to the first slide.

Mike Bazar: We just think of it as lost productivity or it's slow or maybe it crashes once or extra. But all of this stuff is starting to come together in a big spider web of you just can't have outdated technology anymore. Right? So a few things on how to mitigate security risks of using it, right, you have to keep track of your software and your hardware vendors and know what their security bulletins are. So you can either go sign up a lot of them have support type emails they'll send out with security bulletins and other things you need to apply security patches when they're released, which is great, but in itself sometimes can cause issues like print nightmare. When it happened, Microsoft released a patch to solve a printer security problem and it caused more printer problems in the way they did that.

Mike Bazar: So then they released another patch to update it and other things. Make sure you're using a firewall. And this is the one we see a lot of the time where people have a firewall but they haven't updated it in a long time. We had a customer who had a firewall, we kept telling them to update, it was a comanaged thing. So we kept telling their in house people, update your firewall. There's a known vulnerability, there's an own vulnerability, there's a known vulnerability. Do you want us to do it? And they kept saying no, we'll do it. And then our security software alerted that somebody across the internet was trying to mount shares on their server and steal all their data and they had to go pull their internet connection and shut everything down. And it was all through this known vulnerability.

Mike Bazar: And so they'd updated it never would have happened. We caught it, no damage happened. Which is good. But why have the fire drill for an hour and a half, 2 hours? Their whole system was down. They couldn't sell, they couldn't transact, they couldn't do what they needed to do because they had to just go pull the internet, then go back and update the firmware, make sure everything was right, make sure there wasn't a security problem. All this happened because they didn't update the technology the way they were supposed to. Make sure you're using strong passwords. But on top of that, multifactor is a big thing. And that's again, newer types of technology. Multifactor has been around for a while, but it's being pushed more and more. People tend to be resistant because they feel like it's a pain in the butt.

Mike Bazar: But that's one of those things that will stop a huge amount of these hacks is just having multi factor and that's where you get code in your email or ideally you're using like Google Authenticator or AUTHI, microsoft Authenticator getting a text to your cell phone. But it's where you either have to put in an extra six digit code or. Click a link to verify in your email that you are who you say you are. When you go to log in, educate your employees about cybersecurity best practices. Again, we do a lot of cybersecurity training. There's some products out there you can do it with. But two years ago, three years ago, weren't having these conversations.

Mike Bazar: Just the other day we had a customer that gave away their password to somebody and then that guy logged into their email and we found it and we fixed it before bad happened. But it was because they didn't have two factor turned on because they weren't doing education right. All these things can happen because you aren't using the newest of this security technologies and other things that are out there. And the thing I would say about that last bullet point of hire a trusted provider, an It provider is a lot of those other things are hard to do, they just are right? And a lot of companies either. You can't hire a jack of all trades that can do everything well.

Mike Bazar: They do parts of it well, and I'm not knocking any of this, but we see it a lot in companies that are maybe 5100, 200 users will have one in house It person and they're so busy doing all the day to day, they can't do these other things. And so we do a lot of kind of co managed things where we can help with the security and the compliance, help augment, we can take it all over whatever works for your business. The point being to do all of these is hard and difficult. And if you don't have a good It provider that's doing it, you're opening yourself to risk. And that's the other conversation you would have is if your It provider is not talking to you about these things, not having somebody come have different conversations with you, that can be a problem.

Mike Bazar: And that in itself might be a reason that you want to look. And at a minimum, you should have the conversations with your It provider. And if they don't give you answers that you like, might be an option to go start shopping and saying, hey, you're not talking to me about how you patch and how you keep everything up to date and how we're educating people and how we're doing MFA, all those things. And I want to know because this is my business and my baby and the thing that I've built. And so don't let these things kind of age and get old and not do something about it. Make sure you're having these conversations as well.

Jon DePerro: Yeah, concrete, tangible example. That's what Mike said earlier. Windows is announced. Microsoft announced Windows ten hits end of life in 2025. There's a myriad of reasons it's all security based, but there's reasons that means end of life. No new patches, no new they don't care what happens to it. So if you're a business owner, you should know exactly how many Windows Ten machines you have, and you should have a date on a calendar that you've decided they will all be replaced by then and replaced doesn't mean I put in the order on Amazon hoping that it's shipping. Right. That is replaced. Up running users files are transferred, like everything. Right.

Mike Bazar: And the thing is, that doesn't have to be painful. A lot of the time. What usually happens is you don't think about it. Keeping technology up to date is not important. The end of life comes up and now you've got 30 days to replace 40 computers. And that's painful. But if you start now, hey, let's replace a couple a month, go for the old ones, let's replace those and just escalate through. And we can work it in with budgets, we can work it in with need, we can work it in all these different things. But if you wait until it's 90 days till end of life, and you have to be HIPAA compliant, PCI compliant, CMMC compliant, all those things that say, how do you patch? And now your answer is, I can't, because they don't release security updates.

Mike Bazar: You instantly have this problem that can cause a lot of problems down the road. And so you need to stay ahead of that.

Jon DePerro: You don't have the problem. Every procrastinator in the world has that problem. How many companies are going to wait till the last minute to replace their Windows Eleven devices?

Mike Bazar: I'm glad you asked COVID supply chain all over again.

Beau Dickie: Yeah, it's good that you asked that question because it's happening right now. Server 2012 is end of life in October. Server 2008 went end of life last year. Server 2016 is next on the chopping block. And it's all mostly because of security issues. Some of it is feature sets. They've got new features that are available that aren't backwards compatible. But those servers, you can do a quick scan of the Internet and look and see. And there's still over 180,000 in the US alone of Windows Server 2012 online talking to the Internet right now.

Jon DePerro: Yeah.

Mike Bazar: Which means there's more that are behind that we can't see. Right? Right.

Beau Dickie: That's just the ones that we can see with a free open security scan of the open Internet without breaking any laws.

Mike Bazar: And we'll talk a little bit more about end of life here in the next slide. But one of the things, and we've kind of gone back and forth as we've weaved through this, because they're all very closely related, but the big thing on this slide is steps to mitigate compliance risk. Right. So one of the things is you have to know what it is.

Jon DePerro: Right.

Mike Bazar: So you got to stay up to date on the latest regulations, what impacts your industry. PCI is getting major updates that are all rolling out. And if you accept credit cards, you need to know what that is, and a lot of what this does is it makes it and this is john is always good with this, right. So if you accept credit cards and the ODS of you getting sued or failed out of a PCI, audit are usually lower than most people worry about, which is why people generally go, what's PCI compliance? I don't care. The problem becomes when somebody abuses your account, right, your terminal and your credit card machine, whatever it is, they hack into your computer, they make all these fraudulent transactions, and you go back and say, I don't want to be responsible for those.

Mike Bazar: As these new agreements come out, as these new compliance requirements come out, those credit card vendors are coming back and saying, you didn't comply with the agreement, you're liable for that. So where before normally you'd be able to say, hey, that $50,000 in fraud, that's their problem. It now becomes your problem depending on what agreement you signed, what your contracts say, and what the regulations are talking about. Yeah.

Jon DePerro: Landry's restaurant chain, bunch of restaurants, probably 1100 locations. Now, understand that's a big enterprise, and I hate giving huge examples to people because most of the people on this call are SMB. Right. But legal precedence usually comes from big enterprise. Right. So Landry Seafood had an issue. There were Bazillion visa that got compromised. A Bazillion Visa transactions were found to be fraudulent. Visa went around doing audits at restaurants. It wound up being $30 million for them to send the forensics teams to go do all the audits. Landry's was found to not have been in violation of anything. They weren't they were generally within the terms and conditions. So Visa hands them a bill for $30 million and say, what was the cost of making sure you are compliant? And Landry says, well, wait, we didn't do anything wrong. Right.

Jon DePerro: They said, you're right, but the contract you signed said, if there is a breach, you'll bear the cost of the investigation. And it went to court and Landry's lost. That was the deal you signed. And I will argue, Mike, I'm going to put you on the spot as the business owner. Will you raise your hand and swear you've read every page of every contract you've ever signed with every vendor?

Mike Bazar: No, I mean, that's it. We haven't looked at all of them. We generally look at it. We run some of them through.

Jon DePerro: Sure. Yeah. I'm obviously putting them on.

Mike Bazar: That's it. There are parts in there, right. And that need to go back and be reviewed or changed. That's one of the things I would say we do, especially with John. Right. We go back and look at it. And so as those contracts come up, we're reviewing those better than we ever have before, because we're adapting to the new technology and regulation. And that is one of the things that we do with customers. Hey, part of Onboarding, let's meet with your insurance agent. Let's look at your PCI agreements. Let's look and see what these are. Because if we can find the gotchas, you can either buy insurance to mitigate it, you can accept the risk, you could throw cash in the bank somewhere, or you can tell that credit card company, I don't want this agreement anymore.

Mike Bazar: And we're going to go find a different agreement from a different provider that has more favorable terms back to and.

Jon DePerro: You can tell, like, I'm sick of a Mike because he's got my favorite phrases informed risk decisions. That's the goal. No one's saying don't take credit cards. All I'm saying is there's a reason why one costs three and a half points per charge and one costs five points. Right. Whatever industry you're in, you can tell your prospects why you cost more or less than other vendors. Their Kia doesn't cost what a Lamborghini costs. And that's okay, right, with the It stuff, most of our clients that I see mike that we support, they truly don't understand the It ramifications of why one credit card vendor is three and a half points and another one's five points. Or why one insurance policy is $8,000 a year and the other one's $6,000 a year.

Jon DePerro: Because they just see, well, they're both a million in coverage, so I'll go with the cheaper one. Let us take a look at why those sneaky hidden terms that you're agreeing to.

Mike Bazar: Yeah, for sure. So anyways, running down the list of this, right? You've got to make sure you know the regulations. You got to review your technology to make sure it's up to date and compliant. Like, we'll talk in a minute. We've already kind of talked end of life, end of support. Those kinds of things become really they matter. Have a plan in place to respond to the data breach or security incidents. That's a big piece of that. And then educate your employees about best practices. Again, number four is probably one of the easier ones to do, and a lot of people don't do it. It's just a matter of having a service that sends out education, makes sure people are trained, tests them on that, looks for the weak spots.

Mike Bazar: And then you find out that Susie in accounting clicks on every single phishing email. Well, let's go educate Susie, and let's go find ways that we can maybe mitigate risk around Susie. Have we limited her access to things? Can we monitor it? Can we turn on a different service? There's things we can do to help mitigate those risks, but if we don't know where they live because we haven't adopted the newer technologies, then you just kind of are walking around with your pants on. So getting into and we've already kind of talked about this end of life and end of support, right? A lot of people don't think about this, and they just think, I have a switch. I'll run it till it dies. I have a PC, I'll run it till it dies.

Mike Bazar: I have a server, let's run it till it dies, then I get it. Because we want to, as business owners, get everything we can out of the investment that we've made and that isn't a bad thing until it hits an issue and you can't do the security that you want, you can't do the compliance that you want, it becomes an actual performance problem. We've seen a lot where we'll take people that have databases. Server is good, everything is good. It's running on old traditional spinny hard drives. And if it's a big database and we can move that to solid state hard drives, it's ten times faster than it was. That is a huge increase in performance. Which means every query every person in your company makes off that database is quicker and faster. That means they're more productive. That's a benefit.

Mike Bazar: But that's because in new technology and so a lot of the time we might look at it and go hey, your server is good. This is going to be supported for another few years. But why don't we replace these hard drives? Why don't we upgrade this piece of it? Why don't we add a component? When you put this server in, you put in X amount of Ram, which is short term memory and the stuff you're using could take advantage of more. Let's upgrade it because we can do these things. So again, kind of bringing this back, sometimes the technology just needs the upgrade for the speed, for the process, not because of security and compliance for other things.

Mike Bazar: But a lot of the time when you get to end of life and end of support, what that really means is nobody's going to support it anymore. So when a hacker finds a way in, nobody's patching it, nobody's going to go back and make sure that they can't. Nobody's shutting the door on that vulnerability. And if we don't shut the door on the vulnerability, you're just constantly exposing yourself to more and more risk. And then from a compliance perspective, from some of these other things, like again, back to the government contract, if part of that says how do you patch, how do you do this? Make sure that you have capable security and you can't, you can move yourself out of compliance and now you can lose contracts. You could lose potential to do business, right?

Mike Bazar: Your credit card company may come back and go hey, we're going to charge you x thousands of dollars a month because you're out of compliance and you can't update that software or that hardware like you're supposed to. And so there's a lot of these things where it really starts to matter and you need to make sure you pay attention and know what is end of life, what is end of support. Again, hopefully you've got a good trusted It provider that's doing that for you. Having those conversations that we're going out and looking at it because that's what Bo and his team, they spend a lot of time doing is tracking that through our systems and making sure that we know what's end of life that we communicate with our account managers who are communicating with our customers.

Mike Bazar: And so they're coming back and saying, hey, did you know Windows Ten is going to be end of life in 2025? And we want to have a conversation about how we need to do it because again, if you got three computers you could probably buy those tomorrow and it's not going to kill you but you've got 30 or 300. We need to really start planning this because if you have a lot and you're in that bigger range, if you've got let's say 500 days, I don't know what the days are until it is. And you've got 300 computers that's replacing a computer every couple of days to make sure that you're up there. That's a lot of work if everything's Windows Ten.

Mike Bazar: So that's where we want to make sure we're really looking at these things, building plans and not letting stuff get to end of life and end of support because it's just an unnecessary risk that you don't need to take as a business. And so one of the ways you can do that right, end of life, they support technology issues, right? If you're waiting that long, it's probably just mean if you're waiting to replace servers until they're end of life or end of support, maybe slow, you're going to lose a lot of productivity. Again, back to that stat of intel saying if you replace desktops every three years, that fourth year it'll pay for itself and increase productivity gains.

Mike Bazar: And we see that a lot where people have really old servers and we put in new and they're like wow, this is fast, or we move it to the cloud or do something that it looks at. And what that really adds up to is and you hate to say this because I don't always want it to seem like it's a headcount thing, but if you have ten people and they're all 10% slower, you probably, if you kept your technology and things up to date, could run that same business with nine people instead of ten people. That becomes productivity gains. And maybe it's not that I want to get rid of the 10th person, but now I can grow and not hire eleven, right? How do I continue to grow and be more profitable and do more things with what I have?

Mike Bazar: And a lot of the time that comes back to having the right technology in place to make you more productive, to lower your security risks, to move you further along that productivity chain because there's a big labor crunch that has happened and COVID masked some of it. But if you talk to a lot of economists and other stuff they're basically saying with Boomers retiring and big other people coming into the workplace and as the economy is growing, we might face a labor shortage for the next several years. So having effective technology that makes you more productive becomes an actual need now, more so than people look at it, because we just need to try to do the same job with less people because we have to.

Mike Bazar: There's going to be less people that are going to fill some of these job roles and other things as we go forward or they're going to be changing jobs and other things as we go. So newer applications also become less and less compatible with older aging tech. And then overall, your performance starts to drop, so it takes longer to do things. Here's a list of stuff. End of service dates. This is just for Microsoft, but we use this as an example, right? If you have Windows Seven one 2023, it was out of support. So you're Hooped. You have Windows 8.1. Same Server, 28, same Windows Defender. If you have old software, you start running down this list and you start looking at, oh, I'm using Office 2013, that's not supported anymore.

Mike Bazar: So now they aren't going to fix problems with macros and other things that might cause security risks because that's a real vector for people to attack. So that becomes a risk. You start looking at Excel 2019 and for Mac and some of these other things and those are out real soon, right? PowerPoint Office 2019, that's all going to be out real soon. So are you talking about how do I replace Office to the newest version so that I'm not out of compliance with that? Right, so there's these things that you're going to start getting end of support dates and stuff creeping up. And if you're not paying attention, it becomes a real problem and a real expense. And so you want to go do that. So there's a website out there called endoflife Software we use that.

Mike Bazar: You can go look at it, look at your software and other things, but it's a searchable database of over 100,000 products and pulls up news articles and other things, but also end of life and end of support. And so a lot of these things are the big important things that we have is making sure that you're not end of life. Productivity gains. How do you comply with security and compliance requirements for legal contracts, cyber insurance, some of these other things that a lot of the time when we say compliance, people think it's a regulated industry. But a lot of the time. It's just being compliant with the contracts you signed with your vendors, compliant with the industries that you're in, like HIPA and other things. Compliant with the states that you operate and their privacy laws.

Jon DePerro: I'll tell you Mike, what we stay busier with is if you will out the term compliance requirements from people's customers saying, hey, we're doing vendor due diligence. And that used to just be financial, right? If I'm going to go with Mike's ball bearing company as my preferred ball bearing vendor because I need them in my factory, it used to be very financial, right. If I sent you a big order, can you actually process it? Do you have enough cash reserves? If I make you my guy, will you be there when I need you? Well, that's 100 year old process and they've got that down. What they've realized now is the thing more likely to knock Mike's ball bearing out and therefore put my lawnmower factory out of commission, right? Is cyber, right?

Jon DePerro: How resilient is Mike and his ball bearing factory to a cyber attack? Do I have to get a bad phone call from Mike saying I can't ship you ball bearings for two weeks because my end of life server wasn't patched and now it's been ransomware. Know it's going to take us like two weeks to be shipping again, right? And we're seeing that not just in manufacturing. Bo and I were on a call today that was clerical office support staff. Six months ago, you wouldn't have seen that. But here it is. It's more than just HIPAA. I get HIPAA, right. And the HIPAA police are not coming for you. The world is going to ask you, are you doing the bare minimums, and can you prove it now?

Jon DePerro: Where do you look for your list of bare minimums that we can help you navigate that could be your client, could be your state government.

Mike Bazar: Well, and some of this just to try to keep it to how's old technology, right? I mean, the point of the webinar is what we get back is these conversations happen. Old technology makes it harder to comply, makes your people less productive, makes it so you can't track things, makes it so you might not be able to comply or have the security that you need. And again, a lot of what we want to go back and talk about and if you guys have questions, by all means chuck them in the chat. But what we really wanted to make sure we're covering in this isn't just because if we do a webinar, it says old stuff makes you not productive. That's like 35 seconds and people get it.

Mike Bazar: But where they miss it a lot is the security, the compliance, these other pieces that come in. And so I don't want to feel like it's running off in one of the direction or the other and you're thinking, I wanted to figure out how old technology matters. To me, that's where it matters now. More and more, the risk that you create by having old technology becomes the problem over just susie's computer is eight years old and kind of slow and we're going to replace it whenever we feel like it because Susie doesn't do a whole lot or whatever that case is, right? And now we want to start looking at how do we make your people more productive, how do we make sure we maximize labor efficiency?

Mike Bazar: How do we make sure we maximize the people that you have, how do we make sure you're compliant and don't lose business and opportunity because you weren't compliant, because you had to stop and do these things because you got hacked and it brought you down because you didn't want to update stuff, right? Something as simple as that TPM chip were talking about before. The reason why that even matters is you lose a laptop and it's encrypted and you can prove it. You have some level of safe harbor around that in terms of data breach, but if it isn't encrypted or you think it is, but you can't prove it now becomes a reportable incident. And that's a whole different thing because somebody accidentally misplaced a laptop for four days.

Mike Bazar: Well, your insurance or compliance might say, you have to report that within 24 hours of knowing. Well, if they just misplaced it for a few days and they're pretty positive, it can get stolen. And you can do all the other stuff for safe harbor, you might have a window there where you can say, let's go find it before I have to go reported.

Jon DePerro: How many times has an employee checked a laptop in a suitcase that didn't show up for two days or three, right?

Mike Bazar: Now, if you can't prove it was encrypted, that's a reportable incident. Then it shows up, and you're like, well, crap, we just said we had a data breach. But you didn't really have a data breach. You just had to report it because you knew it was missing.

Jon DePerro: That's right.

Mike Bazar: It wasn't supposed to be. And you can't prove it was encrypted because you had old technology, right? That's where all this starts to come full circle of becoming a real problem, and you just don't want to have to go back and report it. And again, maybe you say, Well, I don't have any of that. Regulation 250 Texans data is on that, not to mention other states. You do have to report it, right? Because that's what the law says, and you have to go comply with that.

Jon DePerro: The two calls Bo and I had this week, I mean, this week not like six months ago. We had it happen once, twice. This week we're on with clients who it's their customers saying, we can't do business with you if you don't do it. Now they're under the gun. They're trying to sign a contract. They're being asked, do you do this?

Mike Bazar: Yes.

Jon DePerro: No. And the answer today is actually no, you don't do that. Right. So how do we get now we're in this fire drill to get them to quick? Yes. If we would roll this back to those strategy meetings and say, are there any contracts you want to pursue in 24 that you currently don't do, like government contracts or state education. Like education. Mike, if you do education, call Mike, talk to Mike and his team. There's stuff coming down the road for you. Be prepared for it. If you want to sell into education. There are compliance issues, so it's not just about it. Well, I got to send email, so I guess I need it. It's about what business goal do you have?

Jon DePerro: If your goal is to sell to schools, it can either prohibit you from doing it or enable you and end of life back to this thing. One of the biggest thing is unmanaged software and devices. And the biggest reason we can't manage software and devices is because they're old.

Mike Bazar: Yeah, well, for sure. So kind of wrapping up here. I don't know if Bo, you have any closing thoughts or not just because you've been quieter, but if you guys need anything, you can email us info at vector Choice. There's a phone number you can email myself, Bo or John. Those are our emails. We watch them, we monitor them. We're happy to respond to people if you have questions, concerns or thoughts. But the big point of all this, if you aren't sure a lot of the time, the next good step is say, hey, can we do an audit? Can we have a conversation? Let's talk about this, because I don't know where we're at and I don't want to get caught unexpectedly having to upgrade a bunch of computers or do something or whatever the case is.

Mike Bazar: So shoot us an email, ask for help. We're always happy to help with that. But Bo, you have any kind of closing?

Beau Dickie: I would my big thing is I would say that if you are already if you're unsure, it's cheaper to pay me to do an assessment than it is to pay me to do incident response. And I'm happy to do it. Even if you're not worried about whether or not you're doing some of the things. If you just want an idea of what a threat actor is looking for and how they're going to find a way in, give me a call, pick the number, shoot me an email. We can get something on the schedule because that's something else we can do for you as well. To show you where the gaps are at.

Mike Bazar: We can do some fairly affordable kind of audits, even if you have an It provider, just to keep them honest. Right. We get audited by our we have a third party audit us to make sure we're doing what we say we're doing because we want to be able to check boxes and say were doing them and that somebody else said were doing them. It wasn't just us. And so a lot of the time we'll find that where somebody has a third party It company and they just aren't sure what we can do. An audit. And if they're good, great. You know, they're doing what they said they were doing. And if they aren't, that's a different conversation.

Jon DePerro: Or your in house guy, you may have an in house It guy. And the client that Bo and I were talking today, all their stuff was end of life. He's actually really smart. He's getting more done for his time and budget than any human on the planet. But he has a time. I mean, there's only so many hours in a day. He only has a budget that he has. He has to put the fingers in the dam. Right. He can't plug them all. He actually loved having us come in and show his boss this is all the stuff one man's not able to keep up with, and he just got an assistant hired. So even if you are an It guy at a company, let us make you look good.

Jon DePerro: Let us help you get bigger budget right, and show this is not something one person can do on their own.

Mike Bazar: Yeah, no, for sure. All right. Well, with that, I don't have any other slides on that. I think it was good. Again, if you guys have any questions or anything else, by all means, shoot over an email. Again, that was the info@vectorchoice.com. Or give us a shout. You can just check out the website@vectorchoice.com. But we appreciate everybody hanging out with us today, and we'll see everybody next time, next go round.

Beau Dickie: Absolutely. Thanks, everybody.