Young and Profiting with Hala Taha - How to Stop Cyber Attacks From Destroying Your Business | Entrepreneurship | Ramon Ray | Presented by Bitdefender

Episode Date: October 1, 2025

Small businesses have become the number one target for cyber attacks, yet most entrepreneurs don’t realize how vulnerable they are until it’s too late. One attack could wipe out years of growth an...d instantly damage customer trust. In this episode, presented by Bitdefender, Ramon explains why cybersecurity is essential for small business owners and how they can protect their business from today’s digital threats without hiring an IT team or becoming a tech expert. In this episode, Hala and Ramon will discuss: (00:00) Introduction (03:03) Entrepreneurship Lessons and Personal Branding (06:09) Public Speaking Strategies to Build Influence (09:51) Why Small Businesses are at Risk of Cyber Threats (12:21) Common Cyber Attacks and How to Prevent Them (18:37) Cyber Attack Scenarios and What to Do (28:49) How Creator Entrepreneurs Build Audience Trust (33:15) How Entrepreneurs Profit by Embracing Failure Ramon Ray is a serial entrepreneur, bestselling author, keynote speaker, and small business expert. He is the publisher of ZoneofGenius.com and has spoken to global audiences on major stages, including SXSW, VeeCon, and the Aspire Tour. As Bitdefender’s Small Business Ambassador, Ramon helps entrepreneurs protect their businesses against cybersecurity threats. Sponsored By: Bitdefender Ultimate Small Business Security: Save 30% when you go to bitdefender.com/profiting  Resources Mentioned: Ramon’s Book, The Celebrity CEO: bit.ly/CelebCEO  Ramon’s Website: zoneofgenius.com Active Deals - youngandprofiting.com/deals  Key YAP Links Reviews - ratethispodcast.com/yap YouTube - youtube.com/c/YoungandProfiting LinkedIn - linkedin.com/in/htaha Instagram - instagram.com/yapwithhala Social + Podcast Services: yapmedia.com Transcripts - youngandprofiting.com/episodes-new  Disclaimer: This episode is a paid partnership with Bitdefender. Sponsored content helps support our podcast and continue bringing valuable insights to our audience. Entrepreneurship, Entrepreneurship Podcast, Business, Business Podcast, Self Improvement, Self-Improvement, Personal Development, Starting a Business, Strategy, Investing, Sales, Selling, Psychology, Productivity, Entrepreneurs, AI, Artificial Intelligence, Technology, Marketing, Negotiation, Money, Finance, Side Hustle, Startup, Mental Health, Career, Leadership, Mindset, Health, Growth Mindset, Passive Income, Online Business, Solopreneur, Founder, Networking

Transcript
Discussion (0)
Starting point is 00:00:00 I've recognized this for a while, and I think as technology evolves, crime evolves with it gets better and better. So it's a constant cat and mouse game of catch up. You've built and scaled and exited so many different companies. You're a serial entrepreneur, a motivational speaker, an author. Talk to us about some of the biggest lessons. What you see in the headlines of amazing media that we see on TV, it may be different than the reality of experience.
Starting point is 00:00:29 Running a business is not just about putting your face out there, growing. It's also about making sure you protect your business. What is it about small businesses that make them more vulnerable to the cybersecurity attacks? We're so busy. We're clicking, clicking, clicking, clicking. Oh, no, I just clicked on a text. Now I got hacked. What are some of the common cybersecurity attacks that you see happen to small businesses these days?
Starting point is 00:00:53 You have fishing, you have ransomware, and you have malware. Are there certain types of industries that need to be hyper alert? Hala, I'm telling you, it's all of us. And the reason why, because... Yeah, fam, you've got your hands full running your business. But here's the hard truth. And I want you to listen up. Small businesses.
Starting point is 00:01:27 are now the number one target for cyber attacks. One click, one weak password, one moment of distraction could cost you everything that you've built as an entrepreneur. And that's on top of everything else you've got to juggle. One minute we're thinking about customer service, the next minute hiring, managing people, putting out fires, and then also trying to keep our eyes on growth. It's a lot being an entrepreneur.
Starting point is 00:01:49 So how do we balance it all without burning out or losing sight of what actually drives our business forward? And at the same time, protect ourselves from the hidden that nobody talks about. That's why I'm so excited today to spend a little bit of time on cybersecurity, something we don't talk about often enough, with small business champion and serial entrepreneur Ramon Ray. Ramon has started five companies. He's sold three of them, and he's a sought-after voice on entrepreneurship and small business success. He's also the small business ambassador for Bit Defender, one of the world's leading cybersecurity companies
Starting point is 00:02:23 where he helps entrepreneurs safeguard their businesses in today's digital first world. On top of that, Ramone has spoken on some of the biggest stages in the world like South by Southwest, VCon, and the Aspire Tour, and he's the publisher of ZoneofGenius.com and the author of The Celebrity CEO. In today's episode, we're going to be talking about the hidden risks that can threaten everything you've worked so hard to build. Ramon will break down what those risks can look like, and more importantly, how you can protect your business without getting lost in all that tech jargon.
Starting point is 00:02:53 We'll make it as easy as possible for you guys to understand. If you're an entrepreneur trying to juggle it all and still sleep at night, this conversation is one you don't want to miss. Ramon, welcome to Young and Profiting Podcast. Thank you, Hala, for having me. I appreciate it. I know we're going to have a good time. You've got just so much under your belt that I'm excited to talk to you about.
Starting point is 00:03:13 And the first question that I have is really about your entrepreneurship journey. So you've built and sold multiple businesses, which is every entrepreneur's dream is to actually build and then exit a company. So talk to us about some of the biggest lessons that you've learned over the years being an entrepreneur. Sure. I think that one is that what you see in the headlines of amazing media that we see on TV, it may be different than the reality of experience. And what I mean by that hollow, for example, is, yes, I've sold a few businesses, but a lot of them were just relationships. Let's say you and I, yeah, what's up, girl? Listen, I built this for seven years. Oh, you want it? Okay. What are your needs? Can we do it? Or yeah, what's up to my dude or somebody who I know.
Starting point is 00:03:54 know. So it's not that cavalier. There is contracts, there's due diligence, but it's not some billion dollar valuation meeting in the ballroom of your big hotel. Point is, it starts with relationships, at least how I've done it at my level. It's relationships. So a lot of small business owners wear a lot of hats. And I'm sure you've been there being an entrepreneur where you're the CEO, you might be the CFO, the CFO, the CMO. What do you tell somebody who's just so overwhelmed as a new entrepreneur having to wear all these hats. The biggest thing is one, prioritize. You have to be able to prioritize adeptly. Number two is a delegation. And now, depending on the type of business you're running and what you're doing, maybe you don't have a
Starting point is 00:04:38 team of three, four, or five. It could be just you, but either way, delegate in some way. Number three, breathe. In an ideal scenario where there's no major literal fires to put out or anything like that, life's going to go on. By God's grace, you're going to go on. By God's grace, going to wake up again. So you know what I mean? Okay, you didn't get that import done today. You didn't get that video edited today. You didn't call that client today. That's okay. Calm down. Do it tomorrow. Like I mentioned earlier, you're an author and you have a book called Celebrity CEO. And you're really a proponent of putting your face out there, having a personal brand, being the face of your company. Why do you think that's so important, especially in 2025 as an
Starting point is 00:05:20 entrepreneur. You know, Hala, I think that we know the large brands, take your pick, a famous car company, coffee shop company somewhere, whatever it is, the brands that, and I don't mean this disrespectfully, we don't really care who the founders were. We go get our transactional item from them in some way. But I find that for the smaller business owner, Ramon included, our smile, our handshake, how we show up, how we sound, it was southern accent, northern accent, all those things that goes towards our brain. And as I said before, right, are relationships. So I'm a firm believer, I think, for the smaller business that your biggest weapon,
Starting point is 00:05:57 your competitive advantage, it very well could be you because relationships. Now, when you're growing a $20 million business, $10 million business doesn't mean that that doesn't matter, but it's a different game you're playing. So you've spoken on amazing stages. You did the Aspire tour. You've done Gary V's events. You've done South by Southwest. So talk to us about how you even get on these stages.
Starting point is 00:06:20 and also maybe one or two tips of how you make sure you do a great job. If you wish to be on big stages, making big impact, are you really good on stage? Honest with yourself, not your mama said it, but are you really good on stage? Number two is that really good on stage validated by the audience and by your clients, by your sponsors, others calling you back. Number three, videotape yourself, watch yourself on stage. You may cringe a few times. Number four, if you're really good at it, I would suggest people do the power of self-promotion,
Starting point is 00:06:56 and I know you know this well. Take now the good videos, you know, edit them a bit, showcase them out. So I can go on this, but I'll pause a bit. But I think that between being very good at it, self-promoting yourself, there are people in your circle who are going to say, knock, knock, knock, hey, Ramon, hey, halla, hey, the audience here, can you come to our event and what's your fee? That's what I do. If somebody had to decide their fee for the first time, what would you say? Here's what I would say.
Starting point is 00:07:26 Look at the people who we know. Take the Damon Johns of the world, all Sharks on Shark Tank, and Marcus Lomotis, whoever we want, and you know, the main people we see all the time. What are their fees, Hala? 150, 170, 110, mean 110,000, something in that range, maybe 80,000, but that's something. Now, they're getting that fee because of their fame. They're getting that fee oftentimes because they can attract an all. audience to set event. Ramon Ray, I'm very good, but I'm not the names I've mentioned. So therefore,
Starting point is 00:07:56 if it's helpful in my calculation, my fee is 25,000. I can sit without stuttering, without thinking, oh, that's high. I believe that's the value I can give to an audience. So that's how I do it. Now, somebody just starting out, assuming you're really good, like you're going to slay, you're going to drop the mic, start at three. Start at five, see what happened. But I'd say go a little hire because let's say you want to hollet to hire you or a moan to hire you all we're going to do is say hmm seven's a bit rich could you do five and you're going to be happy and don't forget you need to get your reps in to actually get good so you might be doing some gigs for free i did a lot of gigs for free before i ever got paid russell brunson is my client i monetized
Starting point is 00:08:38 his podcast he's been my client for a couple years i do all his events for free till this day because it's to my benefit to be in front of 7,000 people on stage with Tony Robbins. So I don't need to get paid if Russell asks me to speak, right? So there's certain opportunities where you just do it for free. Anahala, I love that. That's all I wanted to echo with you and vibe with you on that. People sneer sometime, depending on the circles of probably maybe some of our mutual friends, free. I'll do free all day, as you said, depending on the opportunity.
Starting point is 00:09:08 The proverbial Oprah Winfrey, oh, Russell Brunson calls me, don't pay me. I've done work with Seth Godin before. You think I said, well, Seth, let me think about it. Hmm, what are you going to pay me? No, no, no, no, no. Yes, let's work together. We will figure out the money later on. So I wanted to echo that, and even though just starting, assuming you're practicing,
Starting point is 00:09:26 getting in the reps, what Hollis said is true. The reps are important. And if you're really good, you say, hey, I'll show up happy to speak for free. Maybe pay my flight, pay my hotel, if you don't mind. Is there a food allowance? We'd love it. And you slay it, now you built a relationship. Now people say, oh, we want to have you again.
Starting point is 00:09:42 now you can earn the right to get money. So yes, I love that aspect of quote-unquote free, but with caveats, what's the value, what's the ROI? Exactly. So running a business is not just about putting your face out there, growing. It's also about making sure you protect your business. And I know that you're an ambassador for Bit Defender. So talk to us about when you first realized that cybersecurity was something that you needed to pay attention to as an entrepreneur.
Starting point is 00:10:12 Did something happen where, like, oh my gosh, this is my wake-up call? Yeah, I think it's one of those things that oftentimes we can't forget about the power of being more secure and the power of cybersecurity. I'm 52 years old and I've been in this business of content for a long time. Hackers, malware, malicious people, bad digital actress have been around for a long time. There used to be these things called pay phones. You put a quarter in it's these little metal things and you push it into the slot. It makes noise. Kaching!
Starting point is 00:10:40 Hala, there were hackers back then using. whistles to break into the phone. So my answer to the question is, I've recognized this for a while. And I think as technology evolves, crime evolves with it gets better and better. So it's a constant cat and mouse game of catch-up, which is why brings us to one aspect. I'm honored to work with Bit Defender and help educate all small businesses, all entrepreneurs. We need to be more secure. What is it about small businesses that make them more vulnerable to the cybersecurity attacks? Yeah, I think there's a few things. The larger brands, all that think of any household name brand that we see on the proverbial TV,
Starting point is 00:11:15 they may have whole departments, they may have a 2,000-person cybersecurity team. They may spend hundreds of thousands to millions of dollars on cybersecurity. And as you know, Hala, guess what? They still get hacked. But for the small business owner, for the entrepreneur, for someone like myself, I work in a home office, I got a small remote team. I'm not thinking about that. I don't have five people in Gleevelde.
Starting point is 00:11:39 gleaming computers like some sci-fi movie protecting me. So I think that's why for us. And also, Hala, as you mentioned earlier, we're so busy. We're clicking, clicking, clicking, clicking, oh, oh, oh, no, I just clicked on a text. I thought it was from Hala, but it was fishing, and it wasn't from her. Now I got hacked. So I think those are some of the reasons why. Yeah, and I think this is even more prevalent for creator entrepreneurs.
Starting point is 00:12:02 Like, we were just talking about the need to put our face out there. I don't know how many times my team gets messages where people, are pretending to be me or Jenna Coucher is in my network and I keep getting emails from people pretending to be her. And so it's just so scary. For people who think that this is not a big deal, what are some of the common cybersecurity attacks that you see happen to small businesses these days? Absolutely. And I want to address that point because I'm in the same boat as you. I think as social media goes, we're all producing content. Our faces are out there. Our voices are out there. This is what we do. Very few people, even somebody who's just said an honorable way, just running a
Starting point is 00:12:38 bakery. They're posting on Instagram, so I just wanted to address that's a big issue. Same with me. People, Ramon, is this you? It looks like me. It's a shaved head black guy with glasses smiling handsomely, but no, that's not me behind the account. So I wanted to recognize that. So a few things that we can do. I think one, definitely do your best to have as complex as passwords as you can. That's one. Number two, can you try to please people, try to change your passwords every so often, whatever that every so often may be for you. A big thing, even though that is even increasingly becoming less secure, enable two-factor authentication. Half the people probably know what it is. For those who don't, that's that little annoying and convenient,
Starting point is 00:13:21 but very secure. You log into your bank or you log into Starbucks, and your phone gets a text that you have to enter a code in to log in. So that's number three. Also, HALA's education. You know, even my team, it's a remote team, even if people I work with employee or not, Just educating them and what I know. Hey, listen, here's the procedure where we're going to pay somebody. If it's over a thousand, here's even a more enhanced procedure. Those are a few things people can do. And I think actually what you asked me was also some of the attacks.
Starting point is 00:13:49 You have fishing, which is masquerading as somebody else. You have ransomware, and that's the dirty one where your data's fine. You just can't get to it unless you pay someone money. So you have ransomware, and you have malware, you're going to a website, you're going to page or downloading an app that infects your computer. So those are a few things. You have also the attacks where it's some denial of service, kind of a fancy word meeting. An overwhelming force is bombarding your servers, which means legitimate people cannot access it. So those are a few of the common types of attack. And then earlier, I addressed some things people can do.
Starting point is 00:14:25 I feel like I've had all these attacks with me. The other day, I remember with my website, we just kept getting somebody who kept submitting contact forms. And then, they just did that until the website basically froze and nobody could get on the website. So it was somebody who was trying to attack our company. It's just so crazy. What are the motives? What are these people want? Wouldn't it be nice? You and I should have like a big event. Hey, all the hackers, could you come together? What do you all want? Like, could you be nice? But I think a few things. And you're right, I've gone through the same thing. And what's annoying about that is that they're overwhelming it, which makes it the real customers can't get in and or I'm sure
Starting point is 00:15:01 your team or you have seen the forms coming in. I get the same one, you know, 102.3. Dash. 102.3.0. And I'm like, really? But I think a few things they want. One, some people are just being malicious and have nothing else to do with their time. That's a few of the people. I wish more people were just that the case. Number two, keep on mind, Hala.
Starting point is 00:15:19 It's easier and easier to have an attack because the tools are easier. Anybody with the basics of knowledge, if you can set up a Facebook page, if you can download an app to your phone, you can download malicious apps, hit a button and do it. So that's number two. and, of course, the criminal element, the biggest ones that are sometimes backed by state actors are backed by criminal organizations, not just guys and gals on the street, but behind computer keyboards. They want to get money from Hala. They want to steal Ramon's data. They know that, okay, 10,000, 20,000, a million, whatever it is, people are in his database. How can we harvest that
Starting point is 00:15:54 information, combine it with what else we have, create a digital persona, and maybe we can apply for five million credit cards? Most of them won't get through. But if X percentage get through, they've made easy money. So at the highest level, money is some motivation, however it's packaged, reselling the data or proactively ourselves getting the data, and of course, notwithstanding, breaking into your bank account directly, which is a bit harder. So hence the data and manipulation of that is often what they want to do. Digging deeper on that, are there certain types of industries or types of companies that need
Starting point is 00:16:32 to be hyper alert of people wanting to do these cyber attacks on them? I wish it was. Now, for sure, if you're in the HIPAA, and I forgot what HIPAA stands for, but you know, you're in the health care space, there's definitely rules and regulations regulating you. If Ramon gets into the new gold bullion industry, I'm going to have to take a bit more secure than if I didn't. But Hala, I'm telling you, it's all of us. And the reason why, because from metaphorically, one.
Starting point is 00:17:02 button I hit, I can hit a button and say, go find me all the unprotected networks, go find me everyone that has low threat levels, and go attack them all at once. So that's the problem that makes it easier. Now, they're not cherry picking. We're just going to attack pharmaceutical. Nah, we're going to attack everybody, see who we can get through, and now we'll pay more attention to them. This episode of Young and Profiting is brought to you by Bit Defender, a global leader and cybersecurity. Most small businesses think that they're too small to be targeted, but the truth is we're prime targets for cyber attacks. One breach could derail everything that you've worked for. But here's the good news. Protecting yourself doesn't have to mean becoming a tech expert. That's why I turn to
Starting point is 00:17:45 Bit Defender's ultimate small business security. It's a powerful all-in-one cybersecurity solution for small businesses. It's designed specifically for business owners who don't have a dedicated IT team. It protects all of your team's devices, scans for fishing and scams, manages passwords, and even checks the dark web for leaked info. Unlimited VPN allows your team to work securely from anywhere. The dashboard is super simple. I set it up in minutes, added my whole team, and now everybody is covered whether they're in the office or working remotely. No IT staff required. Bit Defender makes cybersecurity so easy so you can focus on what really matters, growing your business and serving your customers. See if Bit Defender Ultimate Small Business Security is a right
Starting point is 00:18:26 fit for your small business. Save 30% when you go to Bitdefender.com slash profiting. That's Bitdefender.com for 30% off. I want to play a fun game really quick. Let's do it. I feel like it's a good time for a game. It's called Cyberheist. So I'm basically going to go over a couple different fake scenarios and you tell me what do we do as an entrepreneur. What could we have done to prevent this? What can we do to placate the issue and make it better. So scenario one, the fake CEO wire transfer. So hackers spoof your email and trick your finance manager
Starting point is 00:19:06 into wiring $25,000 to a fake vendor account. How do hackers typically pull this off so convincingly and what system should small business owners have in place to make sure money never gets sent to the wrong hands? I love this. And so how this happens, it's very easy for technical people, which all hackers are, most of them, to spoof, to fake an email address.
Starting point is 00:19:30 That's one. Or, instead of it being from facebook.com, being from facebu.com, and you just weren't aware, as it were. So that's how and the why it happens. The way around that is for any wired transaction to say, here's the policy. We will authenticate it. We will confirm that this is what you want to do via two pre-authenticated methods. So, for example, Hala, I'm going to call you back at this number. It doesn't matter what number you said to do it. Doesn't matter what number came in.
Starting point is 00:20:01 I'm calling you back at a number we both agreed, things like that, and or closed the system. So I'll give credit to something like a bill.com or other services that are built to say these are the two data points. The money transfers, our customers are already secure and validated, and it will only be done there. Hala's assistant won't click at 3 a.m. Oh, Hala said to send Ramon $10, and she just clicks it in. sends it from your account. No, no, no, no, no. So that's how to solve that. Scenario 2, the USB trap. An employee brings home a free USB stick from a conference and plugs it into their work laptop. What kind of damage could that one move cause, and how do you train a team
Starting point is 00:20:40 so they don't fall for these low-tech traps? Love it. And that's a very good scenario. Could have been a hacker, a bad actor, who's targeted thousands of people at said event. You know, just put up a box of them and said, hey, free take one. Or it could have been targeted. Okay, we know Holla's team is coming, and it could be more malicious, like they're targeting your organization, for example. How to prevent that? Number one, companies can lock down and secure their computers. And again, Bit Defender offers solutions like that to say, hey, listen, install our software in all your computers. These computers or this computer at this time, we're going to limit the external files that can go into the computer.
Starting point is 00:21:18 So that's one. You can manually or programmatically limit what happens. Number two, of course, that's where you install software that says, hey, any file that comes in from an external source, we will automatically check. And number three is really just to have great policies and to educate people. You have an external USB drive. It wasn't from staples or Amazon that you got new. It was random places. Do not use this.
Starting point is 00:21:41 And that's where also that third leg I talked about before, education, education, education. We tell our kids, don't get into the van or the guy you don't know. We tell them that since they're born. employees need that same training. And then also there's softwares that actually block fishing and spoof domains before they can even hit your inbox.
Starting point is 00:22:01 You could sign up with a company, I think, like Bit Defender, that could actually block that stuff before your employees ever get it. I think we need that at YAP Media because I didn't realize we could be blocking this and I feel like it happens just every day. Dean, to take a quick break, you want to go right now? Wait.
Starting point is 00:22:17 Yeah, I got to just call my COL. Like, why don't we have this? Yes. And I just want to mention one of the thing, you know, again, I don't want people to walk in a too paranoid world, but you take your phone hollow. So you and I know each other. There's some trust I hope, you know, whatever it is. You can't walk in paranoid. Let's say it was a stranger. I come into your studio. Hey, my name was Ramon. I was at the Starbucks and my battery died. Hala, do you mind? Can I just, and I'm still talking and moving. Can I just go to your PC, plug in? And now my phone has malware that you don't realize is now going to your computer. So things like that. Watch out from everyone, but especially from people you don't know. don't trust and haven't been validated. These are scary. So let's continue on with the cyberheist game. So number three, you open your laptop on Monday and you find a ransom note.
Starting point is 00:23:03 All your files are locked until you pay in Bitcoin. Walk us through what a smart entrepreneur should do first in that moment and what they could do ahead of time to avoid being in this position ever. First in that moment, it is tough because those ransomware emails more than not are legit and real. Companies have said, hey, we've chosen to not pay. All our information is gone and we're going to start from scratch. Everybody can't do that. But that is a real, real scenario because you ask what to do when it happens. So that's real. Number two, maybe get a security expert just to verify that it's not a double fake. Like, hey, holla, hey Ramon, your computer's
Starting point is 00:23:41 locked, holla scrambling, getting ready to pay or not, and realizes, oh, that wasn't what they said it was. So that's immediately get to a security expert who can help you with that. to do before. That's where it goes back, as you just hinted, as you said very eloquently, blocking those things before they come in, and then good backup. Now, you need to be careful, and this is where getting an expert to help, getting the right software to help, etc., because make sure you're not backing up bad data. But a good backup can solve that because with the right forensic team, they can say, okay, great, this was infected seven days ago. Sorry, how, sorry, Ramon, sorry millions of small businesses, right? We can't help you for the last seven
Starting point is 00:24:20 days, but you know what, we can bring you back to eight days ago. You'll be good. So that's where a good backup comes in. Is there actually a situation where somebody is asking for ransom for the data, you pay them, and they actually give you your data back? Criminals are criminals. So I'm sure some don't, some do. But the best of it, I'm not a criminal everybody, but let's say I had to get in the mind of there. Hall, I attack you. Don't I want you to pay me? Because when I attack your friend, you're going to say, yeah, Ramon's a total loser. He's a evil person. But we paid the $175,000. Two seconds later, we had our data.
Starting point is 00:24:54 So you see the kind of game they play. Go take your pick, Hala. Don't pay me the $150,000. Your data's gone. Or as some have done. Yeah, we paid them. And guess what? It was back.
Starting point is 00:25:03 Yeah. It's so interesting because I think as your company grows, you might start really acquiring valuable data. For example, I don't think we had that much of valuable data at first. But now I feel like we're starting to get a lot of valuable data that we need to protect. And keep in mind the life's work that you've been. built and did, you wouldn't want just that to be shut down. I'm sure you could do it again, right? YouTube and social and all the stuff, you do it again. But think of that. You're down
Starting point is 00:25:28 for 30 days or 15 days. You're not sure which devices to use. It's just going back to your business, a media company. Sure, maybe you don't have banking information on it. But that's just a your reputation. It's just, it's inconvenience. Speaking of that, a hacker builds a fake LinkedIn profile, pretends to be an investor, wins your trust, and then sends a file loaded with malware. How do you spot the red flags in situations like this, and how do you protect yourself down without shutting down every potential opportunity? I love this. Here's what I've done and what people have been the kindness to do for me. Most times, Hala, you and I, for example, have a new relationship, but I'm sure you got people you rock with on a regular basis, Russell, whatever it is. You know their vibe.
Starting point is 00:26:11 They just don't write that way. It sounds weird, but at least those are some things you have to do. Like, wait a minute. Hala said, and by the way, my doggy said hello, she's never said that before. Let me just double check, calling her on her cell or texting her through what I know. So that's one. Number two, this goes back to be careful before you open or click. Somebody did this to me just two days ago. They were kind enough to say, Ramon, somebody asked me about SBA loans. Seems fishy, but was this you?
Starting point is 00:26:43 And I said, yes, I referred them to you to ask for help in financing. She said, thank you. And now she's going to work with them. So that's a great example. She's in the financial industry. A lot of nefarious people come at her. And so she just did a quick double check. I confirmed she's off to the races.
Starting point is 00:26:59 Okay, last one. So this sounds crazy, but I've heard horror stories about this. It's real. So hackers can sneak into your office network through something as random as a smart fridge on Wi-Fi. How does that even work? And what should business owners know about securing their smart devices and IoT gadgets?
Starting point is 00:27:17 So your smart fridge is a computer. Your smart fridge is plugged into your network, either wired or wireless. It's even more advanced than a copier, even of the same principle. So once a hacker gets into your smart fridge, which in itself could have its own access point, it could be broadcasting its own Wi-Fi signal. It's just a fridge, holla. It just has some yogurt and stale bananas inside. Why do we have to secure that?
Starting point is 00:27:45 But guess what? that's the weak point. So the hacker gets into your smart fridge and all they do is maybe do a simple code chain, something very innocuous, which exposes your entire network. So that's why even your IOT devices and a good security consultant again
Starting point is 00:28:02 can set up your router, your network, all these things, and segment them for you. These are IOT devices. They should only be acting a certain way. This, however, is a server. This should act a certain way. So that's where segmenting your network and working with a security professional at that level
Starting point is 00:28:18 and installing good software, that's where those kind of things can help at. And all of these different scenarios actually can be protected by using a service like Bit Defender. That is correct. So you don't need an IT team, you don't need a staff of 20 people, you can work with a company like Bit Defender
Starting point is 00:28:34 that can protect you from all of these different malware issues, the ransomware issues, the fishing attempts, the IoT hacking. There's so many things to worry about And we're not, most of us at least, are not IT professionals that have experience with that. All right. So let's move on to trust beyond just cybersecurity. Let's talk about trust with an audience, right?
Starting point is 00:28:57 So you've been able to build an audience. You're speaking on stages like we talked about. You've written books. How do you build trust with your audience? One of the things that I enjoy doing and what my clients, what the sponsors I work with have said that they appreciate. But what I'm about to tell you is I always say, I have no right to talk to the audience, to engage with the audience from stage if I don't know them. So how do I know them? As you mentioned, I've done it at Aspire or two. I've done it at V-Con with
Starting point is 00:29:24 Gary Vaynerchuk, done it at the biggest events in the world. I go through the audience beforehand. Sounds simple, but I find that not all speakers do, many in fact don't. They like to stay in the green room. I get it. But I'll go, let's say, Holly, you're in the audience. You're small business nobody in an honorable way, right? Hey, my name was Ramon, which you know already, because you're the attendee, what's your name? Oh, I'm Hala. I'm from Utah. Why are you here? Well, we have a lawn care business. You get what I mean. Do that three, four, five times. That's the super hack, and I can mention more, but that's the one thing I do before I get on stage. I want to walk to the audience and just greet four, five, six people. Now that gives me a room temperature.
Starting point is 00:30:03 That gives me a vibe. I have a feeling just by talking to 10 out of a thousand of who I'm serving, who I'm talking to. That's what I do. And I feel like the same could go for When people are commenting on your posts, you want to walk into their door, which is the DMs, and have a conversation with them. What's going on? How did you find out about the podcast or how did you find out about me and have a real conversation? And then you also get a pulse of, for me, what are my listeners like? You know, what are my Instagram followers like? And it's so important. I bet, Holla, that it makes them feel special. You know, in that case, online, imagine them say, oh, wow, actually, yeah.
Starting point is 00:30:39 Out of all the thousands of comments, Holla gets, Holla responded to this. one and said hi and DM to me or said thanks for being a listener. That means a lot. I remember Hala going back to the real word as we're online offline, but the same principle. I took my wife to a concert. I'll never forget the entertainer. He's a Christian gospel musician. He was said, thank you for flying here and seeing me. It's just his thanks. I was humbled. So, you know, like you said, Hala going online, putting just one or two or three or four, five comments out of the thousands, people see that and they all feel connected to you. Yeah, 100%.
Starting point is 00:31:14 Okay, my last question for you really goes back to being a creator-entrepreneur, having a personal brand. Now, you've put out this website called Zone of Genius. Talk to us about what this website is for, and then also, how can we become a thought leader in our niche? How do we hone in our Zone of Genius? A friend of mine, his name is Joel. He was playing bass guitar, leading a choir, and singing. at the same time. And he's a gentleman who's been academically, you know, difficult in school and things of this nature. It was a little rough for him. But when I saw him holla, I was like,
Starting point is 00:31:52 this guy is in his zone of genius. True story. Right there in a spot, pulled up my phone, bought the domain name. And I held it for about half a year or so. And when I sold one or two other things that I assets, you know, publications I had, I built zone of genius. Because that to me is the epicenter of entrepreneurship. What's your passion? What do you love? What excites you. And if you can add on to it, what you do freaking so well, that I think we've earned the right to be in our zone of genius. So that's why I started it at zoneofgenious.com. Thanks for asking.
Starting point is 00:32:24 And really to encourage entrepreneurs, thrive, build your businesses. And if you can do it within your zone of genius, even better. So, Ramon, I end my show with two questions that I ask all of my guests. The first one, and you can answer however you want. It doesn't have to be about anything we talked about today, okay? What is one actionable thing our young importers can do today to become more profitable tomorrow? Build real relationships. Pick up your phone and text even better voice message via WhatsApp, Facebook Messenger.
Starting point is 00:32:53 I do this. The people in your life that maybe you haven't said thank you. Pick up the phone. Hey, listen, Jerry, I just wanted to say six months ago you invited me to speak at your event. Eight months ago, we did this together. Yesterday you sent me a box of chocolate. Thank you. So that's the one actionable thing.
Starting point is 00:33:07 pick up the phone, leave a voice message ideally to a person. That's what I suggest people do. I need to get better at that. The last question is, what is your secret to profiting in life? This can go beyond financial. I'm risk tolerant. I don't fear failure. That's probably the better way to say. I don't fear failure. I failed many times. I've messed up many times. I could be a better father, be a better husband, be a better entrepreneur. But I don't take myself too seriously, although I take my work seriously, if that makes sense. And so that's probably the best thing I do to be more profitable, be better a young entrepreneur is really not taking myself too seriously,
Starting point is 00:33:45 being risk-tolerant or not being afraid to take risks. I want to talk about that a little bit more because I think this fear of failure really hurts a lot of entrepreneurs because they end up not going after what they want. So what happens when you fail? How do you approach failure? And how do you get into that mindset of not being afraid of said failure. I'll give an example of a few years ago. Many people know the computer company,
Starting point is 00:34:12 Dell computer. Michael Dell was on stage at CES, where you've probably been before, you know, thousands and thousands of people, one of the biggest trade shows in the world. He was finishing his speech, whatever he was doing. I walked up. I didn't know the bloggers and influencers were in the back waiting for him, but I was very new to this game many years ago. Hallad, you can imagine, Ramon stood up in the main CES auditorium. Hey, Mr. Dell, I have a question for you. he looked down and walked away. Not being rude, that was meaning that wasn't the appropriate time. So that's an example of what I'm trying to express.
Starting point is 00:34:43 I took my shot. It was the wrong timing. I didn't know it. I was embarrassed. But now years later, Ramone Ray has been on stage and hosted events with these brands, works with the best brands and people in the world as you know. What I'm trying to get at is that when things fail, I need you to think about when you take a risk.
Starting point is 00:35:02 What's the worst that can happen? Now, if it's your life, your family, your work, Why, if your husband, anything that's dramatic like that, whatever it is for you, for Hala, for Ramon. But if the worst that can happen is, Hala's producer says, thanks, not a fit. The worst that can happen is Starbucks says, no, we don't use these kind of cookies. The worst that can happen is the client says, no, you don't have enough experience to mow my lawn. That's the worst.
Starting point is 00:35:26 That's not too bad. Keep doing it. Learn from it, refine it, and do it again, and never stop taking reasonable risk. And even reasonable is contextual, because I've taken big. embarrassing risks many times in my life, but it's helped me be where I am today. Such great advice. Ramon, thank you so much for joining us on Young and Profiting Podcasts. I love the conversation.
Starting point is 00:35:47 Thank you, Allah. Big thanks to Bit Defender for sponsoring this episode and for helping to keep small businesses safe. Protect your team, your data, and your business from scams, ransomware, and fishing. Remember, you can get 30% off at Bit Defender.com slash profiting. 30% off at bitdevender.com slash profiting to protect yourself from everything that we spoke about today. And speaking about our conversation, huge shout out to Ramon Ray for all the insights that he shared.
Starting point is 00:36:17 Remember, guys, one successful attack could destroy years of your hard work in just seconds. In today's digital world, cybersecurity is not optional. It's survival. And failing to act could mean exposing our data, our customers' trust, and even our entire livelihood. The question isn't whether you'll be targeted. It's if you're going to be ready when it happens. The smartest move is to prepare now before it's too late.
Starting point is 00:36:42 If you listen learned and profited from this episode of Young Improfiting, please share it with another entrepreneur who needs to hear this. And if you enjoyed this episode, drop us a five-star review on Apple Podcast, Spotify, CastBox, or wherever you listen to the show. Nothing helps us reach more people than a good review from you. You can also catch the full video conversation on YouTube as always. Just search Young Improfiting. And if you want to connect with me, you can find more.
Starting point is 00:37:05 me on Instagram at Yap with Hala or LinkedIn at Hala Taha. Until next time, this is your host, Hala Taha, aka the podcast Princess, signing off.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.