Wednesday , February 18 2026
Are you properly protected against a Cyber Attack?

Information Technology and Cybersecurity for Business

On this episode of “Professionals of the Inland Empire” (PIE) podcast, John Tulac delves into the world of Information Technology (IT), cybersecurity, and the risks of inadequate preparation with guests, Shantae Hansen and Eddie Darmawan.

IT and cybersecurity are crucial areas for every business, regardless of their size. Unlike earlier days in business where IT departments didn’t exist, today, robust IT infrastructure and skilled personnel are absolutely essential for successful business operations.

Hansen, working with VC3, specializes in cybersecurity, cloud solutions, and managed IT services, specifically catering to local government and small to mid-size businesses. Her primary focus is on educating clients about these critical areas. Darmawan, on the other hand, owns and operates an independent firm, where his passion for technology drives him to provide tailored managed IT and cybersecurity solutions to small and mid-sized businesses.

The landscape of IT protection is fraught with challenges, primarily due to the constantly evolving nature of cyber threats. Average companies often struggle to maintain adequate security, and even large organizations face expertise gaps. Furthermore, the overwhelming frequency of software updates presents a significant hurdle for effective protection.

Businesses can significantly enhance their proactive IT security by leveraging cyber insurance requirements, which often provide a strong baseline for implementing essential measures like firewalls, EDR, and security awareness training. A proactive integration of IT and security is always more effective than reactive measures taken after a breach has occurred. Moreover, robust cyber hygiene necessitates commitment and continuous employee awareness, with multiple layers of defense being crucial. This layered approach, akin to having several locks on a home, ensures that even if one layer is breached, deeper system penetration is prevented.

Companies must adopt a mindset to “expect the best, prepare for the worst” by having a comprehensive incident response plan in place. Cybersecurity fundamentally rests on three pillars: Protect, which involves preventative tools; Detect, focused on identifying threats; and Respond, encompassing backup and recovery strategies. The “human firewall,” cultivated through employee awareness, remains the most critical defense. Immediate reporting of any suspicious activity and maintaining a “zero trust” mindset are paramount for an effective response.

Email phishing continues to be the leading cause of data breaches. Effective mitigations include disabling auto-forwarding, enabling MFA on all email accounts, and most crucially, fostering human awareness coupled with the Zero Trust principle. Employees require thorough training to suspect unusual emails and verify any suspicious requests, especially those that appear to be internal, via phone, as modern phishing techniques can sophisticatedly spoof internal addresses.

In the constantly evolving digital threat landscape, robust IT and cybersecurity practices are indispensable for business safety. This includes continuous vigilance, the implementation of multiple defense layers, fostering employee awareness, and establishing strong partnerships with IT experts.

The PIE podcast aims to showcase Inland Empire professional talent, foster local economic development, and highlight the Provisors networking community. Catch the full show on YouTube @ProfessionalsofInlandEmpire.

Check Also

Effectively utilized AI can enhance customer experiences

Effectively utilized AI can enhance customer experiences

This week on Professionals of the Inland Empire (PIE), Homa Shaner and Michael Couper join …

Leave a Reply

Your email address will not be published. Required fields are marked *