For the third consecutive year, Hill Tech Solutions has been named one of the world's premier managed services providers on the prestigious Channel Futures NextGen 101 list!

Need IT Support?

Ron Hill Discusses Small Business’ Cybersecurity Weakest Link On Chamber Chat

Share This Post

Share on facebook
Share on linkedin
Share on twitter
Share on email

Hill Tech Solutions’ very own Ron Hill was recently interviewed on WHGM FM’s Chamber Chat to talk about the Route 40 Business Association and cybersecurity best practices.

The foundation of effective cybersecurity isn’t expensive hardware or AI-based software… it’s awareness. The more that users know about the tactics used by cybercriminals, the better prepared they’ll be to defend against them.

That’s why our Principal Consultant, Ron Hill, recently joined host Justin Mallow on WHGM FM’s Chamber Chat to talk about cybersecurity and other topics relevant to the Harford community.

“There are a lot of different layers to security,” said Ron. “There are a lot of different pieces to the puzzle, we work with industry leaders of software and hardware vendors to come up with a set of best practices, and we help customers with that.”

This is a vital topic for discussion – after all, the cybercrime business has never been bigger. It’s estimated that the global cybercrime industry will cause up to $6 trillion in damages in just a few years. In exploring the particulars of cybersecurity best practices, Ron explained what is often the biggest vulnerability in a business’ cyber defenses – the user.

What Role Do Your Employees Play In Cybersecurity?

“The most important thing to think about is employee education because, ultimately, the end-user the weakest link in any business,” said Ron. “Nowadays, most hacks and breaches come in from email phishing scams and things like that where you click one link that then put malicious software on your machines.”

Your staff can have a significant effect on your cybersecurity – either they know enough to keep your assets secure, or they don’t, and therefore present a serious threat to your security.

So, which is it? Do your employees and volunteers have the knowledge they need to spot cybercrime scams, avoid common pitfalls and keep your data secure?

If you’re not sure, then they may need training – security awareness training helps your employees and volunteers know how to recognize and avoid being victimized by phishing emails and scam websites.

They learn how to handle security incidents when they occur. If your employees and volunteers are informed about what to watch for, how to block attempts and where they can turn for help, this alone is worth the investment.

A comprehensive cybersecurity training program will teach your staff how to handle a range of potential situations:

  • How to identify and address suspicious emails, phishing attempts, social engineering tactics, and more.
  • How to use business technology without exposing data and other assets to external threats by accident.
  • How to respond when you suspect that an attack is occurring or has occurred.

“Getting your employees to understand what’s a real email and what’s not a real email, and getting them to understand how to evaluate, stop and think before they click on those links,” said Ron. “You can put all the software and hardware tools in place but ultimately you have to make sure that your employees understand what those best practices are. Most of the time businesses don’t have the awareness because they’re focused so much on growing their business, they’re not worried about the technology. That’s where bringing us in and allowing us to partner with you and be your internal IT department helps.”

Ron also talked about how Hill Tech Solutions takes a holistic approach to security – approaching the problem from all angles to find an all-encompassing solution so that business owners can focus on their growth, instead of worry about their security.

“We take a holistic approach to security – so we come in, we evaluate the business as far as what their pain points are, then we take a holistic approach to secure their business so they don’t have to worry about the ins and outs of exactly what to do,” said Ron. “We do that for them, and tailor a solution directly to their business that’s affordable.”

In addition to talking about cybersecurity best practices, Ron and Justin also talked about the Route 40 Business Association. Ron recently became a member and has found the new connections to be very beneficial.

“The Route 40 Business Association has been very good for me to meet new business owners, and increase my network of business owners, as well as to help the Route 40 business corridor with giving back to the community,” said Ron.

Associations like these offer business leaders the chance to connect and consult with one another. No matter what point a company may be at – a few months after start-up, or years into growth – one thing stays the same: the challenges are always new, and always difficult to overcome.

This is a specific opportunity for associations like this one to help. The many different representatives of businesses involved in the Route 40 Business Association, and other groups like it, offer invaluable knowledge as to how they acted at each point in their growth, what problems they had to solve, and what solutions they found to be the most effective.

“I definitely wish I would’ve joined earlier, I can definitely see a lot of opportunity for growth just making the connections I have made so far” says Ron. “These connections bring in a lot of different people from all over the Hartford county area, and it’s a great opportunity to network and connect with these people that I don’t know I would’ve met elsewhere.”

Like this article? Check out the full Chamber Chat episode here, and to learn more, check out the following blogs:

Why Is Cybersecurity the Number One Concern for CEOs in 2019?

Spoofing & Hacking: What’s The Difference?

The CEO/CIO Relationship: A Vital Tie

More To Explore