top of page

Focus on Tech: The 3 Tech Myths that can Leave You at Risk Every Day

Updated: Feb 16




Introduction: In today's tech-driven world, cybersecurity is an increasingly critical issue that cannot be ignored. With hackers becoming more skilled and sophisticated, it's essential to debunk common tech myths that leave individuals and businesses at risk. In this episode of The Amber Stitt Show, we had the privilege of speaking with Bryan, a cybersecurity expert from Echelon Technologies, who shared valuable insights and debunked some prevailing misconceptions. Let's dive into the three tech myths that need immediate attention.


Myth 1: Antivirus software and consumer-grade firewalls are enough protection. In the past, relying on antivirus software and consumer-grade firewalls might have been perceived as sufficient protection against cyber threats. However, as Bryan highlighted, hackers have evolved, and so must our security measures. Small to medium-sized businesses, in particular, have become prime targets due to their limited budget for high-end security solutions. These businesses are often seen as "soft targets" and are exploited to gain access to larger entities. To stay safe, businesses must invest in comprehensive cybersecurity measures that go beyond basic antivirus software and consumer-grade firewalls.


Myth 2: Cybersecurity training is a one-time event through lengthy presentations. Another prevalent myth is that cybersecurity training can be effectively conducted through long PowerPoint presentations or annual compliance training. However, Bryan emphasized that such training methods are ineffective in promoting cybersecurity awareness and preventing human error. Instead, he advocates for "new school" training approaches that involve short, repetitive sessions of 5-10 minutes. Ongoing repetition and engagement are key to reinforce good cybersecurity practices. By creating a culture of awareness and vigilance, employees become the strongest defense against cyber threats.


Myth 3: Small to medium-sized businesses can rely on their IT department for cybersecurity. Many small to medium-sized businesses assume that their IT department can handle cybersecurity along with their regular operational tasks. However, as Bryan noted, cybersecurity requires proactive attention and specialized expertise. IT departments, primarily focused on operational efficiency, often lack the time and resources to address cybersecurity adequately. To bridge this gap, co-managed IT services, where cybersecurity companies work in tandem with existing IT personnel, can significantly enhance cybersecurity effectiveness. This collaborative approach ensures comprehensive protection against cyber threats while allowing IT departments to focus on their core tasks.


Takeaways and Conclusion: The cybersecurity landscape is constantly evolving, with hackers always staying two steps ahead. It is crucial for individuals and businesses to stay vigilant and keep up with the latest security measures. While advancements in technology have provided better security technology and protections for small businesses, human error remains a significant vulnerability. Hence, ongoing training and phishing simulations have become crucial tools in combating cyber threats.


During this episode of The Amber Stitt Show, Bryan Wilbourn, a cybersecurity expert at Echelon Technologies, debunked three tech myths: relying solely on antivirus software and consumer-grade firewalls, one-time cybersecurity training through lengthy presentations, and expecting IT departments to handle cybersecurity. By shedding light on these misconceptions, Bryan emphasized the importance of comprehensive cybersecurity measures, ongoing training, and the collaboration between IT and cybersecurity departments.


As we wrap up this episode, let's remember that cybersecurity is not a one-time event but an ongoing battle. It requires constant vigilance and adaptability to address emerging threats. By staying informed, adopting best practices, and seeking professional assistance when needed, we can better protect ourselves and our businesses from cyber threats.


In other cyber security episodes, we shift gears to share strange stories we've encountered in the cybersecurity realm. Stay tuned for captivating tales that will both entertain and inform you. Until then, stay safe and stay cyber-savvy!


Timestamped Overview

[00:02:20] Speaker Brian, from Echelon Technologies, talks about IT service. [00:03:46] Former company bought out, turned clients into numbers, boss left and started Echelon, regained old clients. [00:07:56] Consumer cybersecurity measures are inadequate for businesses. [00:12:44] New school training: short, repetitive, ongoing. Stay savvy, stay frosty. [00:14:31] Clients report phishing emails, vendors block them. [00:18:43] Methods to prevent phishing: stop, think, slam. Look out for suspicious language, verify with phone calls. [00:23:24] Cybersecurity and IT must collaborate for businesses. [00:24:44] Trickle down effect: impacts team, clients. Appreciate pointers and help.


Bryan reminds us to always, Stop, Look, and Think... To find their team you can reach Bryan Wilbourn at Echelon Technologies: bryan@echelontechs.com www.echelontechs.com


Thanks for listening!



2 views0 comments

Comments


bottom of page