Wednesday Mar 12, 2025

Securing Your Sales: Navigating IT and Cybersecurity for Small Businesses

Join Leighann Lovely on this episode of the Love Your Sales Podcast as she hosts Ari Milner, a technology and cybersecurity expert with over 15 years of experience. Ari shares insights on how small and medium-sized businesses can protect their digital assets and secure their systems in an ever-evolving cyber landscape. They discuss the critical importance of cybersecurity, practical solutions for IT management, and the intricacies of dealing with modern cyber threats. With real-life anecdotes and expert advice, this episode is a must-listen for entrepreneurs aiming to safeguard their business from digital threats. Tune in now to learn how to build a robust IT infrastructure and ensure your business's security and continuity.

Contact Ari

Email - ari@planitinnovate.com

LinkedIn - https://www.linkedin.com/in/arimilner/

Website - planitinnovate.com

 

Special Thank you to our Sponsors – Genhead – www.genhead.com and Accelerategrowth45 – www.accelerategrowth45.com

 

Robb Conlon – Intro and outro – Westport Studio - https://www.westportstudiosllc.com/

 

Ready to grow your business? Schedule a call with us today  - https://api.leadconnectorhq.com/widget/bookings/discoverysalesleighann

 

Leighann Lovely: Welcome to another episode of Love Your Sales. I am thrilled today. I am joined by Ari Milner. , a small business technology and cyber security expert with over 15 years of experience. As the founder of Planned IT, he helps business secure and streamline their IT web.

And compliance needs all while working entirely remotely from Mexico city. Ari is also the president of the center of natural medicine in Portland, a [00:02:00] clinic founded by his father in 1991. Now managing the clinic with his brother as their father battles Parkinson's.

Ari is deeply committed to helping small businesses, whether through technology or healthcare operate efficiently and securely. Please join me in welcoming Ari. I am really excited to have this conversation with you. You and I talked previously, obviously, and, um, yeah, I'm just, I'm really thrilled to have you join me.

Ari Milner: Yeah, thanks so much for having me on.

Leighann Lovely: So why don't you tell us a little bit more, You know, what I absolutely love is starting your own business. There are so many nuances as an entrepreneur that we do not think about in the beginning. You know, we're like, okay, I've got my laptop. I'm armed with, you know, this product I'm armed with this widget.

I'm going to go out and people are just going to show up and buy my stuff. [00:03:00] There are so many layers that as you all of the sudden become a real. company, a real boy, as I like to say, or a real girl, , that we don't think about. And one of those is security.

Ari Milner: Yeah, security, I. T. Totally. This is before plan. I.T. I had a computer repair shop in in Portland, , where I'm from. And that's where I got into doing the business. I. T. managed services and, uh, started supporting businesses there. Um, going on site and, , setting up networks, securing networks, , and the landscape has changed so much in the last, uh, 9 years of doing plan I.

that the cyber security needs have gotten. , way more complex, and there's just so much that [00:04:00] you really can't do on your own as a small business anymore. Like, it used to be that you could just go by, like, the Norton or McAfee and you'd be fine. Right? But those days are long gone now and like, 1 example is.

In gosh, it was, I think about 2018, 2019, we rolled out a Sentinel one as a security service option for our clients. And it's a, it's a service that is incredible with how it's actually using AI to Combat cyber threats, and that that's probably the first product in our stack that really had AI as an important component of it.

Leighann Lovely: Interesting. And you're right. The landscape has drastically changed. I remember I was actually talking to my husband and I and we were watching a show from the 90s and there was this, you know, like. Big [00:05:00] huge computer sitting in like the family, you know room of the of the show the house that we were watching and it's like this Gigantic computer.

I'm like you remember that do you remember when you had? That huge computer the dial up you weren't worried about somebody Hacking in and stealing your information, you know the games that I would run home from school I'm like, I'm gonna play a computer game and it was the little the little line that got bigger as it ate The dot on the screen, you weren't, yeah, the snake, is that what it's called?

The snake game, you know, it was a DOS prompt in order to get into it. I don't know if, you know, my daughter's not even going to know what DOS prompt means and I, you know, I'd call my mom up and be like, okay, I'm going to, I'm going to play this game. I can't remember what's the DOS prompt to play this game.

And then I'd have to hang up with her and try it because now I have to use the phone line to dial into the internet. That was not. [00:06:00] Security was not a thing,

Ari Milner: right? Yeah, totally. And that's like, reminds me of, , like you mentioned doing that back in the day where you and every end user had to do those kinds of prompts, but that's something that we're still doing as it professionals writing scripts to run in the background, to automate processes.

Um, and that's also what. I've been incredible at doing in the last couple of years with the large language models where it's a great tool for doing scripts and automation, but all of those tools are being used by the bad guys too. Right? So it's, it's a, you know, a tug of war, I guess, between who can, who can stay ahead, uh, in order to.

You know, protect systems or attack systems.

Leighann Lovely: Yeah, that's that's totally true what what the good guys are doing. The bad guys are doing equally as fast to try to [00:07:00] to basically beat each other out on. Well, how quickly can I break into the system? Well, then that you gotta how quickly can I stop them from breaking into the system?

Wildly interesting, completely like, I'm glad I don't have to do that part. So let's, let's talk about how that has changed and how it has changed when you talk with people about the importance. I can sit here all day long and be like, Oh, Ari, are you telling me that I'm going to have to pay you X, Y, Z a month to keep me secure?

What I mean, come on, really? I'm a small business owner. Are people really going to try to come after me? Like, I don't have anything that they need.

Ari Milner: Yeah, totally., you may think you don't have something valuable, but even just like your contact list in your CRM or in your email client. Like, any of that can totally be used against you and your clients.

Um, your [00:08:00] system could be attacked by ransomware, is a newer, more common threat, that, where you, just locks you out of all your systems, so then your business can't function. Do you have, like, insurance for business interruption? Do you have backups to get it back? Cause even if you pay the ransom, there's many, many cases where, You still don't get anything back after paying the ransom.

It's a, you're, you're negotiating with a cyber criminal, right? So, what are the chances that they're going to even follow through and then even, even once you do pay, say, you get it back, they still have a copy of your data. They could still do nefarious things with it. Right? So, yeah, it the whole industry 20 years ago, um, was mostly like, you're saying break fix.

It wasn't managed services. It was I've got a problem. My system goes down. I'm going to call an it guy. They'll come out and fix it. Um, they may be able to remote in that was [00:09:00] pretty rare back then. Right? Um, but you would get, like, a bill for the fix 1 time, but that just doesn't work for cyber security because we need to be constantly monitoring systems constantly protecting systems.

Um, like, I get alerts all the time for my clients, like, getting, um. Sign is blocked from China or Russia or wherever people trying to get in. There's a lot. That's probably happening to you right now. And you just don't know because you're not monitoring it. Right? And that's that's where an it partner, like, me would come in and make sure you've got the policies in place to make sure that even though they're knocking at the door regularly that that nobody's going to be able to break in.

Leighann Lovely: That's so scary. That's, it's, well, okay, so here's a perfect example of actually something that just happened to me this weekend. I went, I took a little mini vacation. I used my credit card, um, [00:10:00] at a little kiosk in an arcade really quickly, just, you know, reloaded the arcade credits for the girls to go and play games, right?

What a waste of money. And actually, no, because they were entertained. You know, I get to see big smiles. They're entertained. They're playing arcade games. I slipped it into my pocket. We then went home afterwards. I then had an engagement where I had to go out that later on that night and I opened up my wallet.

My credit card's not in there and I thought, oh my God, where's my credit card? You know, now you do the okay, where was the last time I used it? Oh, it was at the arcade. Okay, put it in my pocket. It must have fallen out of my pocket because that sweatshirt now has found its way into the laundry and I'm calling my, yeah, my credit card.

Did you find my credit card? So the great thing about, you know, credit cards nowadays that everybody has apps for them. You could literally pull it up on your phone. You can turn off your credit card with a click of a button. That's great. Not, you know, back in the day you had to track down a phone number.

You got to call them. I [00:11:00] was able to turn it off just like that. But that fear for that moment is I lost it at the arcade. Somebody picked it up. Somebody used it. And now I've, the numbers out there, right? You're talking about an unknown fear of somebody literally just logging into my system and my system houses.

All of my credit cards, possibly my client's credit cards, all of my client's passwords to anything that I may need to access in order to support them and being that I'm a mark sales and marketing company, I'm in sometimes their domains, I'm in their, the back end of their websites I'm in and all of a sudden that crushing feeling of, Oh my God, uh, they're not stealing my information.

Just they could be stealing somebody [00:12:00] else's information and I would be responsible for that.

Ari Milner: Yeah, totally. And there's even like, , depending on your location, there's different local laws for like, breach notifications. When you get hacked, then you have to publicly tell your, your clients and report it to the state and in many states.

And there's a certain different thresholds and windows for that and such. But you're, you're totally responsible at that level. And that's where, , not just cyber security services come in, but, , like mitigation services, like an insurance, , our, our latest service, we've just rolled out this year is a cyber warranty that.

Is actually a 3rd party vendor who's connected to our systems and, , can provide a financial guarantee of up to half a 1, 000, 000 dollars a year in coverage because they're saying, yes, plan. [00:13:00] It is covering our clients and doing best practices. Right? So there's those kinds of. Levels of protection that you can get, , in case an incident like this happens.

And, and frankly, it isn't really like a, an, if it happens, it's a, when it happens, , who are you going to be dealing with? Who's going to be your partner on your side? Right? When something like that happens, how much are they going to be able to have mitigated it? Stopped it, you know, kick them out, , before any real damage could get done.

Right.

Leighann Lovely: Right. Very interesting. , and let me just promise this by say, I don't keep credit cards in my system specifically because of that, because I don't know what I don't know, like, I don't

Ari Milner: like, like you said, credit cards are very protected. Right. But But a lot of payments now are happening, like with ACH or, you know, [00:14:00] just electronic bank transfers that don't have that level of security or insurance that a credit card has.

Right? So. Yeah. Right. It can be scary.

Leighann Lovely: And that's where, you know, it's like, okay, what information do you want to house on your system? Because then you become more and more liable for X, Y, Z. So what do you think the biggest hurdle in your, you know, sales process when you're talking with these small. To midsize companies what do you think for them is the hardest to digest when it's talking about?

And this really is about the sales process like. Because sitting here and talking to you, I'm going, okay, well, fear will drive me to go. Yep. I need you. Some, some companies are just like, yeah, no, no, I'm good. I'm good. I don't need that. You're, you're just trying to take my money. What do you say to that? How do you overcome that objection?

Ari Milner: Yeah, [00:15:00] there's a few sales tactics we use in in I. T. For that specifically, , my personal favorite is when I go into a sales call with, like, a new prospect who I'm not already working with. I'm focusing entirely on. What their pain points are right? And I'm going to sell them on the minimum package that gets them what they need.

So then we have a relationship and we can build up from there. Right? I can always upsell on more cyber security later. Right? , if they're not seeing the value at the moment, and then the tactic to to sell them on it later is we actually have. , a waiver that's like, okay, we recommended that you buy this cyber security service, you know, or this backup service or whatever you're opting to not do that.

We're not liable for that in case something goes wrong. Right. So separate [00:16:00] from all my general agreements that I have with all my clients, if they say no to something that I'm recommending that's best practices, I'm going to be like, okay, you're saying no sign this, please. Or we're not going to be able to continue working together.

Right. Right. So, and that that works probably 3 quarters of the time. Right. They're like, oh, okay. Yikes. Maybe I will buy this.

Leighann Lovely: Well, and it's, and it's funny because it comes down to the same thing of. Hey, here's your house. Here's the insurance we recommend. And I've, I've gone around and around in circles with my, my insurance agent on, and she makes the recommendations and then we go down the list, right?

You know, she's like, well, I recommend umbrella insurance and I recommend it be X amount. And then she'll go, and here's why, because if you have a total loss, blah, blah, blah. And then I go, oh yeah, I should definitely go with the recommended amount. Because now [00:17:00] you, now you understand what the point is, you understand the why behind it.

And now that I'm, now that I've been talking with you and I, and I know other people in, in this, you know, in the managed service. arena, you understand the why, , and you kind of go, right, now I get it. Like, if you're an outsider looking in going, yeah, nobody's ever going to hack me. I'm a one person show.

Doesn't necessarily mean, especially if you have no security whatsoever, you're an easy, you're easy pickings.

Ari Milner: With AI and automations. Now, a lot of the bad guys are doing stuff where they're just trying to break in everywhere with the easy method and whatever they can get in and grab it.

You know, it takes them nothing relative to breaking into a, , a bigger corporation. So they'll, they'll totally take that and run with whatever they can get.

Leighann Lovely: Oh, I, and I've gotten what I think in my career now, um, [00:18:00] I had. , it was an email of, this is an oldie. I'm sure that many people out there are going to go, Oh yeah, that one's happened to me.

Um, an email that looked identical to somebody else at my company that emailed and said, hey boss, can you please update my payroll information? My new bank account is. And then all of a sudden, and it never came from me, and then all of a sudden payday came.

And I'm like, is there a reason you guys didn't pay me this week? And they're like, well, yeah, you emailed us and said you wanted us to update your payroll information. And I'm like, no, I didn't, did not do that. . And it was a really large company. And so somehow that made it all the way to HR because the first person didn't look at the email address.

And see that it was a spoof email address. They [00:19:00] then emailed the next person saying, Hey, this information, this informa And this was a long time ago when this was first happening. And they traced it all the way back to that first person who thought they were talking to me.

Ari Milner: Wow, that's a great example, because , there's so many, there's so many, , possible ways that that could have been stopped along the way, if the right technology, the right security piece was, if there was like a good inbound email security filter, it would have just been like, oh, that's a spoofing thing and blocked it there, right?

Leighann Lovely: Correct.

Ari Milner: But also like, if there was a process at the company that anytime there's a change. You know, call the person to verify it, right? That one seems obvious. It's super obvious, like, you know, just business process, human way to do it, right?

Leighann Lovely: Or you have to have a signature when a bank information changes.

It's kind of [00:20:00] like, but again, this was a really, this was a long time ago when people. weren't expecting that. Nowadays, I think that more people are like, duh. I mean, come on, but yeah,

Ari Milner: well, and user training too is super important for that too. Like maybe if that person who received the, the spoofing, the spoofed email had taken some fishing training and realized it.

, the, the method for checking if an email is legit, they would have taken a few seconds and been like, oh, no, that's this doesn't look right. Let's double check this.

Leighann Lovely: Yeah, right. . And I could go, you know, on a tangent in a million different directions on why, like. Why would I have emailed you and not gone directly to, you know, HR when, you know, you could go in a million different directions, but it's like, wow, how did that, you know, and then there were other ones like, oh, I got a text message, you know, directly from the [00:21:00] CEO of the company with a link in it saying here, can you please click on this and follow the instructions?

It's like, no, first of all, . It was a CEO that always went by an abbreviated name and they put their full name in there and it was like. From, you know, instead of Rick, it was from Richard. And it's like, wait, you don't refer to yourself as Richard, you know? But those, those are the ones like either in, as soon as you click on that link.

And I've, and I've, again, I've gotten emails that come through where,, it really quickly, I've clicked on it and gone, Oh, no, I shouldn't have clicked on that and immediately notified, you know, the IT, I just clicked on something, you're going to probably want to do a complete now, like cleanup of that.

And, and I've been hacked, you know, or at a company, I, I knew that I was the breach and then did the notification of, , sorry, boss, I think I may have [00:22:00] just screwed up. Like, I clicked on this link and now we're, and sure enough, my clients all started getting these spoof emails from me. And I'm like, yeah, , you know, it's one of those put your head down and walk out of the office going.

Yeah. I just created a shit storm here.

Ari Milner: Yeah. Well, so I'll tell you our one breach we've had with the client in the last. 9 years of plan. I. T. , is a tax prep firm and the owner of the of the firm wanted remote access to their own computers. And that's something we do and set up for them. Right? But what happened is the password they used for that happened to be some password that was exposed in another previous breach.

And the 2FA [00:23:00] wasn't set up on it on their account. It was on our accounts, right? And somebody got in. We taught them within half an hour, like, within minutes, essentially, of them getting into the remote system. We were able to block them and kick them out and mitigate a lot of the damage, right? Which we, yeah, we wouldn't have been able to do, or if they didn't have an I.

partner that couldn't have happened. Right? If they had just done the remote access set up to their own system, and then that happened, they would have been like, oh, what's going on? How do I kick this person out? What's yeah, what are we doing? Right? So

Leighann Lovely: interesting, but yeah, how the normal person wouldn't be able to go in and be like, Oh, I'm going to kick you.

I mean, it would be like walking blind.

Ari Milner: Yeah. What they start doing is they'll just [00:24:00] turn it off, unplug cables, and then they'll be like, okay, now what, how do I function as a business? Right. Well, even if you're

Leighann Lovely: unplugging cables, though, we were talking about. You can't unplug the internet. Yeah, it depends on the

Ari Milner: complexity of your environment, right?

Yeah, there's so much that,

Leighann Lovely: yeah. I'm thinking like, you can't unplug the cloud. Like, everything is now in the cloud. Like, you can't, that's, you can't, uh, I guess the main server to where everything is housed. Yeah, if you shut that down. But, I mean, my email is shut down right now and I'm barely functioning.

If you shut down my main server to where everything, I'd be like, Okay, I might as well just go and take a vacation because

Ari Milner: Yeah.

Leighann Lovely: I got nothing to do.

Click on the keys, like, okay, got a black screen. I'll just pretend to work. Yeah, it's, you shut down one system, and you, you don't [00:25:00] realize until, I have a list of things that I have to do right now, that I can't. Because I'm in the middle of migrating my email and it got shut down and they're like, oh, it'll be about 60 minutes.

You don't realize how frustrating that is because you're moving so fast that I never realized that, oh, I send an email, then I go back to something, then I send an email. Now, every time I have to send an email, I have to write down, I have to send this person an email, to send this person an email. Oh, God, this is, this is frustrating, like.

Now I'm creating a backlog of all of the stuff that I didn't even realize that I'm constantly doing on a regular. So if your main system of something went down, your domain, your server, your whatever, the backlog, not to mention if there was damage. [00:26:00]

Ari Milner: Yeah, well, and that's why, that's when you want to already have.

An incident response plan, or a continuity and disaster recovery plan in place. So, you know, like, oh, if this goes down, then this is what we're going to do instead. Right? Or this is how long it's going to take to get back up. Right. There's, there's so many considerations that way, and that's, we call it business continuity instead of just backups where we can actually have backup systems that are like extra copies of the system.

And then the main system goes down, we just like, flip a switch, like, kick it over here instead. Right. And then you're back up and running in minutes instead of like, oh, sorry, it's going to take. 48 hours to do a data restore or whatever. And you're, what are you going to do in the meantime, right? So it depends on how essential the system is, what, how you need to consider it in the, in the continuity plan [00:27:00] and what it's worth, you know, how much.

, is it worth paying more to have it, have a backup continuity system that you can just flip on like that because it's that essential to your business, right?

Leighann Lovely: Well, and it's funny because, you know, for the majority of everything else that we have, your, your website, for instance. You, you always, you have a backup of your website, I mean, you should, you should, if you don't, I mean, if you create a website, you should have a backup, you should have, regularly backing that up, if something happens to your, your main website, you should be able to really quickly just restore that with, like, the original content and everything else, you should have a complete backup of that, and you should be regularly backing that up, if you're making any changes.

You should have a backup of all your files, or that should be backed up on a regular basis, and Even, you know, myself still being a small little shop, I still regularly go in and manually do backups of all my files. Because if my main [00:28:00] computer goes down, God forbid, you know, somebody dumps water on my computer or my computer breaks or whatever.

I have a hard drive, an external hard drive that has a mass quantity of space. I literally back up everything. I'm going to guess that there are a lot of business owners out there that don't think about that. They're brand new. They're like, okay, I'm starting. And then all of a sudden, Oh, gee, I just lost my laptop.

In fact, I was talking to a woman not too long ago who was driving to a meeting at four o'clock in the morning and she got in a severe car accident, almost lost her life. We were talking and now she's, she's getting through the healing process. Three months later, she's still in, still healing from this.

And one of the things she said to me was my laptop survived and I'm like, okay. Like, we shouldn't be talking about how you're so thrilled your laptop survived, you should have a backup with everything that's on that laptop somewhere so that if it hadn't [00:29:00] survived, your business wouldn't have completely just gone away.

Ari Milner: Yeah, totally. The backup super important, but also the encryption on laptops and mobile devices is important. And that comes back to like the reporting requirements like that's something for. , HIPAA, for example, if we've got patient information on a doctor's laptop, right? And that laptop gets stolen, then that has to be reported, right?

, but if the laptop's encrypted when it's stolen, it doesn't need to be reported. They can just buy a new one and be back in business. And not have to worry about it because whoever stole it's going to have to wipe it to even use that machine at all. So there's, there's considerations like that, that.

Most business owners have no idea about that. I'm helping educate them on, like, during, , the audit or risk assessment process. Right. Right. I, I [00:30:00] recently found I did a security risk assessment with a law firm recently and this exact thing came up. I was like, oh, well, we found. Millions of dollars worth of private information on the owner's personal laptop, and it's not encrypted.

So, , if that laptop were to be stolen, you would be in big trouble. Right? That's that's the kind of thing that, , we help with all the time.

Leighann Lovely: Interesting that do you think and this will be my last question because we are coming to time before you get your 32nd shameless pitch here. Do you think there will come a time where it just is mandatory for everybody to have encrypted devices because of that?

I mean, my cell phone, for instance, like. Yeah, if you get my cell phone and you were able to break it, Apple is actually quite amazing [00:31:00] when it comes to like, Hey, if you lose your password, you're screwed. Sorry. We don't give out passwords. We don't give pins. It's, it's your responsibility. Like, and there's been people who, what I, this whole story about a kid who was playing around and it locked it for like 2 million minutes or something like there are Two billion minutes and then Apple's like, yep, there's nothing we can do for you.

We don't that's great. You know, like hey, you can pretty much Know that you're not gonna be able to break into somebody's phone unless you You can figure out the past because it'll continue to just lock you out. So do you think there will come a time when, I mean, devices, it's just a standardized feature that it has to be encrypted?

Ari Milner: Yeah. Well, it's the trend has been going away. Definitely. , , a lot of services are starting to be encrypted by default, like messaging services too, right? Whatsapp and Signal are doing that. Right. They're rolling out, , [00:32:00] even encrypted SNS is, is coming very soon and, yeah, it used to be that the default when you got a new phone was not encryption and that's already changed too.

So, but in terms of the requirements, it just depends on your, your jurisdiction. Like right now, the U. S. doesn't have data privacy and security regulations like Europe does, right? Where a lot of this is mandatory, but there's individual states in the U. S. that do. Right? So it's the kind of thing where it'll probably be coming here soon.

And, and yeah, you're going to need an IT partner to help you fulfill those requirements.

Leighann Lovely: Hmm. I mean, it just makes more sense. It

Ari Milner: just,

Leighann Lovely: it just,

Ari Milner: then again,

Leighann Lovely: one other

Ari Milner: bit related to that is. , quantum computers are coming. [00:33:00] Also, they're already here, but they're, they're very, uh, minimal in terms of their capabilities and how much data they can process.

But quantum computers. , can essentially break any standard encryption. So, regardless of what your regular, your encrypted private key is, a quantum computer is going to be able to break into that and get through the encryption. There's newer encryption techniques that have just been discovered in the last couple of years that are actually quantum proof.

And so that's really the next level on this. Story of where we're going with encryption is we need to get encrypted systems converted over to quantum proof encryption because 99 percent of them are not currently and the quantum computers are coming. That'll be able to break into any of this stuff.

Leighann Lovely: Okay, so you, this would be a whole nother conversation because you lost me at I understand at a high [00:34:00] level that quantum computers are like, next level that I don't get, but I, I did not know that those were becoming. Like, like available. Are you talking available to like the general public?

Ari Milner: Oh, no, no, they're not available to the general public for some time, but they're already available for governments and and schools doing research on them and large institutions.

Right.

Leighann Lovely: Right.

Ari Milner: And they're getting bigger and bigger and more complex. And that's, but that's one of the first practical implications as quantum computers become more common is standard encryption is not going to work anymore.

Leighann Lovely: Right. So

Ari Milner: yeah, that, that's where I was going with that. So

Leighann Lovely: basically the government is not going to be able, an encryption is not going to keep the government out of knowing exactly what we're doing and when we're doing it.

Ari Milner: Yeah, I mean, the NSA is going to be buying all the, all the quantum computers they can, because they want to break in everywhere [00:35:00] and read everyone's everything. Right? So

Leighann Lovely: we'll never be protected from the government basically sticking their fingers in whatever they want to stick their fingers in is the moral of the story.

Yeah. They always got to one up us, don't they?

Ari Milner: Well, but like I said, there is math that is quantum proof encryption that is doable. So that would be a whole other conversation we could get into sometime. It's, uh, yeah, that's kind of the next frontier there in terms of data privacy.

Leighann Lovely: God, that's so interesting.

Okay. Well, and I would love to continue this conversation cause I just, I, I love knowledge and I know that my listeners, you know, know I'm just, I'm a, I'm a total geek, I'm a total nerd. Um, I just, I love to learn, but we are coming to time. So 32nd shameless pitch.

Ari Milner: Yeah. So if you're running a small business, you already know that tech can either be, uh, your biggest advantage or your worst nightmare.

And [00:36:00] that's where PlanIT comes in. We bring enterprise level. IT, web, cybersecurity, and compliance solutions to small businesses, but without that enterprise price tag. Our global team delivers cutting edge technology trusted by business leaders. It's never too early or too late to find the right IT partner.

If you're interested, come to planitinnovate. com and click the button to book a call with me. I'd love to chat with you about your business's tech needs.

Leighann Lovely: Awesome. And how can somebody reach out to you?

Ari Milner: Uh, yeah, my website plan it innovate. com, or you can find me on LinkedIn. I'm Ari Milner, uh, A R I M I L N E R.

Leighann Lovely: Awesome. And Ari, your, um, contact information will be in the show notes. So if somebody is trying to reach out to you, you can check on the show notes. The full show notes are listed on Podbean, but you can also find that on, uh, YouTube on the, [00:37:00] um, where our, uh, Um, show is, listed on Love Your Sales and the YouTube channel.

So please go ahead and, um, you know, find, , Ari's contact information there, but I really appreciate our conversation. It's been fun and, , just filled with a ton of good information.

Ari Milner: Yeah. Thanks so much, Leighann, for having me.

Comments (0)

To leave or reply to comments, please download free Podbean or

No Comments

Copyright 2023 All rights reserved.

Podcast Powered By Podbean

Version: 20241125