Technology, Security and Your Pharmacy
Cybersecurity is a hot topic in all areas of business, and it is also gaining traction in the pharmacy industry. Pharmacies collect Personally Identifiable Information (PII) and Protected Health Information (PHI) from their patients to dispense prescription drugs and to maintain appropriate records. Therefore, the duty to maintain the privacy of this information in this digital world is paramount.
Join our independent pharmacy CPAs, Bonnie Bond, CPA, Kendell Harris, CPA and Scotty Sykes, CPA, CFP® on this episode of The Bottom Line Pharmacy Podcast as they talk to Chris Sykes, IT Director at Sykes & Company, P.A. on the show.
In this episode, we discuss various types of security threats, basic planning tips and opportunities pharmacies can take now to help mitigate this potential risk inside your pharmacy.
The Bottom Line Pharmacy Podcast is your regular dose of pharmacy CPA advice to fuel your bottom line, featuring pharmacists, key vendors, and other innovators.
Stay tuned for future podcasts airing soon wherever you subscribe to podcasts.
If you prefer to read this content, the video transcript is below.
Scotty: All right, welcome, everybody, to another episode, of the Sykes pharmacy podcast, Bottom Line Podcast. I’ll get that right, one of these days. Today, we have Chris Sykes with Sykes & Company, P.A., IT Director here at Sykes & Company, P.A. We have two full-time IT staff members with our firm and Chris Sykes heads up our IT, which is a monumental task.
I cannot tell you how great of a job he does and how important it is to our firm. But we wanted to get him on today and pick his brain about IT security, IT in general, how that applies to pharmacies and things to know and be aware of. So, Chris, welcome and give us a little background on you before we get rolling here.
Chris: Yeah, thank you, Scotty, Bonnie and Kendell for having me on today. As Scotty said, I am Chris Sykes, the Director of IT at Sykes & Company, P.A. I have been with the company since ’06, I believe 2006, and have been in the IT role ever since then and I am glad to be here.
Thanks for having me and I look forward to talking all things IT and how maybe we can impact pharmacies as well with our IT expertise and advice.
Scotty: Chris is my brother for the record, for all the podcasters out there.
Bonnie: I do have a really quick question for Chris, kind of an icebreaker here before we get into the fun stuff. Chris, I heard a rumor about you. So, Chris is a runner. He runs marathons, it is pretty impressive.
Kendell: Very impressive.
Bonnie: But I did hear from someone over the weekend that you had quite an experience maybe a week or two ago that you ended up running and ended up in the back of a pick-up truck. I heard this.
Chris: Yep, I get chased by dogs pretty often, but this dog I think, was not a nice dog and wanted to pretty much eat me. And so, I found the closest thing to climb onto, which happened to be a back of a pick-up truck.
Kendell: Oh wow.
Chris: And I got away from that disaster, I made it unharmed, thank goodness. But yeah, that was scary. I have not run that way ever since.
Bonnie: I heard about that this weekend, and I was like, I might bring that up.
Kendell: That might be a new training technique to increase your speed, a mile or so, just send the dogs at you.
Chris: It was definitely sprint speed, I am going to tell you that, now I have a new route to run so…
Scotty: Well, while we are talking about the running real quick, and Chris’s extracurriculars, he did make it to the Boston Marathon and COVID hit… for the first time in what, and you did not get to go.
Chris: Did not get to go.
Scotty: So, what a shame, but I know you are working on getting back in there, so…
Chris: Yep, slowly but surely, it takes a while to qualify and all that, but yeah, I enjoy running just for overall health and just the routine of it, I enjoy, so maybe one day I will get…
Bonnie: That is how you blow off steam after a day’s work at Sykes & Company, P.A. dealing with all the IT issues, is you run for hours.
Scotty: We are talking about health. Let’s talk about the health of IT for pharmacies, Chris, give us a little general update now where IT security is in general, what is new and hot out there today in terms of IT in general, and then we can get more into maybe some pharmacy-specific items?
Chris: This is kind of cliche. IT today is not what it was a year ago. I mean, it changes so much, everybody knows that, except nowadays, everything is so risky.
Whether you are surfing the internet, doing a search on Google or checking an email, everything has so much risk. more risk to it than it used to.
And so, with all that risk and the fact that we do a lot of business in the cloud now, it just ups the risk even more. And so, with that risk, you have to implement countermeasures. You have to have your defenses up; you have to employ different systems and services and firewalls and software to allow yourself to operate in the cloud and on the internet with less risk. It is all about minimizing your risk. You are never going to get rid of the risk. It is just about how much you can minimize the risk. And so, it is just a balance.
Scotty: And what is that risk?
Chris: Well, let’s just say you store files in the cloud.
Whether it is Google Drive, whether it is OneDrive for Microsoft, whatever it might be, maybe Dropbox… your data is in someone else’s hands.
The risk there is that Google… for example, your Google Drive may get compromised by a nation state attacker. Let’s say, North Korea or whatever it might be. And so, the data is not in your house, it is not in your office. It is somewhere out in the data center that is susceptible to that risk. So, there is always that chance, no matter where you house your data. Even if your data is behind your four walls, it can still be breached and compromised. So, there is plenty. That is just one example of a data risk: having your data in someone else’s cloud or whatever.
There is email risk.
Are you opening up every attachment that you get, or are you very aware of what attachments you should or should not be opening? Or links for that matter; links in emails? Should you be clicking on these links? There are risks in everything. Just a click is a risk. So, it takes some education, it takes training. Speaking of training, we here at Sykes & Company, P.A. do what is called Security Awareness Training, where we have simulated phish attack emails that are distributed to our staff. And it tests them on whether they click things or they do not click things. And it is just a good reminder for them every month to stay aware, to not get complacent with just any email coming in even if it is from somebody you know.
We have videos, security training videos, what to look for in social media, social engineering attacks, those sorts of things, all kinds of stuff. So, training helps to minimize the risk. That is probably the single biggest thing a firm can do. Or a pharmacy for that matter, can do is just training their end users, what to do, what not to do on their systems. It is probably your single biggest-
Bonnie: Because what is sad to me, Chris, is that it is almost like you have to scrutinize and question every single thing you get. So, I just sent an email to Chris this morning that dealt with my daughter and dealt with the school that I know she attends, but it looks super weird. It just did not look like something it should have. And it ended up, I think it is probably fine, but you have to question. And then what I find is, that has become even worse, Chris, is, the use of that kind of thing on cell phones. So, now I used to not get a lot of that on my cell phone, but I get texts constantly now, wanting you to click this link and from places that look like PayPal and things like that and telling you, usually that is trying to help you, “Hey, I think there is some fraudulent activity. Click this link so you can go to these things to look.” And it is not… so everything you look at; it seems like that is kind of the going thing. You have to question every single thing.
Chris: You mentioned, your iPhones and texting. I mean, before the podcast started; we were talking about the Apple breach a couple weeks ago. That – not breach, excuse me, it was a vulnerability that was found in their software. Basically, it was a vulnerability that basically opened up your whole phone for intrusion and attacks and basically, takeover of your phone. I mean, Apple was-
Kendell: Oh wow.
Chris: I have not seen Apple try to push out an update so fervently, than they did that one. That was a pretty big hole. And so, I mean, last thing you want is your iPhone to be taken over. I mean, and then you may not know that it is taken over. here you are looking at your bank site or whatever on your phone and somebody is just watching you, probably. So many risks out there, whether it is a PC, a Mac, an iPhone, an Android, it doesn’t matter. They are all-
Bonnie: And obviously it is super risky and our firm and our practice, we are dealing with lots of Social Security numbers, bank accounts, things like that. But with pharmacies as well, on their platforms, if you are talking about their computer systems and things, I mean, they have all of this health information out there, personal information on all of their patients. So, I would think that that is something that is equally important just as we have to deal with here.
Scotty: That is valuable information, yep.
Chris: Yeah, there is PII, there are… a lot of pharmacies are under HIPAA regulations with medical data.
Chris: They really have to take care of your data, know where it is, know who has access to it, know what is in front of it, what is guarding it, for example. There are a lot of factors to take into account for pharmacy medical-related data, for sure.
Kendell: And Chris, I do have a question. So, at our firm, we are fortunate enough to have you and Joseph here with us. And sometimes when there is a vulnerability or something new, that is going around, you will send an email out to the whole firm. And then I take that email and I forward it to my family just so they know that “Hey, this is what is circling around in the marketplace.”
So, my question is this, you mentioned training, and the training that we do is very helpful, I have learned a lot.
What would you say to a pharmacist who does not have an in-house IT person?
What kind of training or how do they get access to training to make sure that not only they, but I guess more importantly, their staff does not do something or have an action that allows their pharmacy to be vulnerable?
Chris: Yeah, that is a good question. Most pharmacies do not have internal IT staffs.
I can maybe think of one or two clients we have that are very large, multiple store clients that may have an IT person, but most pharmacies that we do business with have outsourced their IT. And so, Kendell, my first thing there for training, is if I was the pharmacy owner, I would be asking that third-party IT provider, do they offer some sort of security awareness training?
Just start there.
Chris: They are providing the IT, most likely they will provide something. If not provided, they will give you a good direction of where you can go. Likewise, Sykes & Company, P.A. can offer some ideas as well for security training, if a pharmacy is seeking for that. But I think a good starting point would be their IT provider.
Bonnie: Yeah, from, well the things that I have heard from other pharmacists that we work with, I think what you mentioned earlier, Chris makes a lot of sense is really about the staff. Maybe not even the owner, because the way I am seeing some of these things done and penetrated would be through the staff, through calling and telling them, “Hey, we are Dell, or we are whoever. And we need to do an update on your computer system.” And they are like, “Okay,” and they give them whatever and they jump on the computer system and grab it. And also, through the phone lines, I think the same way, and websites and things like that, telling them that there is somebody else and it sounds legitimate, and they are able to capture information that way. So, it really starts with the staff, I would think, education with that.
Chris: It does, Bonnie. I mean, just to… the Cisco breach a couple weeks ago, here is another example of what you are saying here. I am reading a headline here on my other screen and it says, this is regarding the Cisco breach, it says the hackers were able to gain access to Cisco’s system by duping one of its employees and allegedly took 2.75 gigabytes of data. And so that one employee was probably phished, through an email more than likely.
Scotty: What is phish? Well, kind of go over what phish is, what is phish?
Chris: So, phish in email… So, I am not saying this is what happened, but a general phish email would be like an email comes from the owner of the company to you. And so, it looks like it came from somebody you know, somebody legitimate, they posed as someone else, and basically, use that as a front to try and gain access to an account of yours, or send money or wire money or log in here. Here is a link, click here, and log in and you can access this file I am sending you. Numerous ways, but basically, they are tricking you to click something, to give up your credentials. And once they have your credentials, then it is pretty much over at that point, then they have access to your data and everything. So, lots of different types of phishing out there, but those are the really most common ways that employees are tricked into something happening.
Bonnie: Yeah. And Chris, what does it look like if you do have a breach? That can be expensive, I am assuming to recover from that, correct?
Chris: Yes, it depends on how quickly you find the breach, I think, to begin with. Did the breach just happen five minutes ago, and you just realized it pretty quickly? If you can stop the bleeding, let’s say within an hour, it may not get so bad. But a lot of times, these breaches have been going on for weeks and firms and companies do not even know it. There has been virus malware installed on networks, just reporting back all kinds of information and the companies do not even know it. So, it depends on how long the breach has been in place. And then once the breach is recognized, then you can start dealing with the aftereffects, which would be obviously implementing your incident response plan. So, it goes without saying, and you need to have an incident response plan. So, the owners of the company, the shareholders of the company can all react, according to your plan, instead of off the hip. You want to know exactly what to do if something happens. So, you know who to call.
Do you call the FBI first and then call whoever is second? But you need to have a plan in place because what do they say? It is not “if,” it is “when.” And so, it is very important to have a plan in place, even if it is a basic plan. Just put something together, one page, if you will, of who you are going to call, if something happens. What are you going to do immediately if something happens? Are you going to pull the plug from your server? Whatever it might be, you need have some sort of basic plan. And your IT provider, going back to Kendell’s question earlier, who do you get to help you with that?
Same person, it is your IT provider that would help you with an incident response plan. It probably is not a part of your month-to-month IT subscription that you have with your provider. So, maybe something, a la carte that you would have to pay extra for, but it is well worth the money to have something in place.
Bonnie: And I would guess and assume that anyone who, and a lot of our clients do a lot of our pharmacies have a website presence, obviously, and then they do some business on there, even if it is just refills and that information is being sent. So, I think anytime you have a website, you have got to make sure you have a good protection with your website as well.
Chris: Yeah, obviously the website, you want to make sure that your website has a secure certificate and that it is SSL-encrypted, through a secure certificate, which most are these days.
You also want to make sure you are using the correct websites. There are a lot of websites that look legit, but they are basically a duplicate. They are a bad website that is a duplicate of a good website.
So, you can be tricked into clicking links and it is not quite the right website. So, a lot of website vulnerabilities out there, too…
Websites get hacked also. And that is how a lot of malware comes into networks. Somebody will click a link or an ad or something on the website and download a virus or malware and not even know it sometimes.
Kendell: Oh wow.
Chris: And so, website security is important, too. And that kind of segues into a firewall on your network…basics. Everyone should have a basic firewall, with a subscription service with malware protection, on their network. Even if they have only got two or three computers, you need a firewall, especially if you have customer data behind that, on your network.
Scotty: Chris, you mentioned outsource. I want to get into some things you can do to protect yourself, but you have touched on the outsourced IT, which a lot of pharmacies do. And what are, I guess, some basic things to look for when you are maybe looking for an outsourced IT? What do you want to see in an outsourced IT? Maybe the good and the bad, as you look for outsourcing?
Chris: You want a firm that is proactive.
You want a firm that will meet with you regularly on emerging threats, upgrades that they may recommend for your company, for your pharmacy.
You do not want someone sitting back patching vulnerabilities, kind of when it is convenient or wait for something to break and they will come and fix it a couple days later. You want somebody that is cutting edge. Somebody that is motivated to take care of your firm, security-wise. I think security is key here. You want security? I would think… No. 1, you want to be protected.
No. 2, you want to look for an IT provider that can upgrade your systems when they are outdated. You want to have your updates in place. You do not want old operating systems. You do not want old antivirus. You want to stay up-to-date on everything.
Someone who can communicate. I mean, communication is so critical and reaction time.
If you email your IT provider, you got a problem, you do not want to wait six, eight hours for an answer. It could be very important. You want to hear back from somebody within an hour or less. So, look for someone who is responsive and somebody that is willing to help you each and every day. I mean, because you are going to have issues every day, you are going to have questions and you do not want to wait for answers; it is frustrating.
Bonnie: And Scotty and Kendell, I believe I have seen a vendor or two at some of the trade shows that specialize with IT, just with the pharmacy industry. I cannot remember what they are, but I think if you look into that, that could be an option. That would be nice to have someone with that experience to at least look into and see if that could be a possibility because they would understand the pharmacy industry and kind of the ins and outs of what goes on with that.
Scotty: And I imagine a lot of pharmacies do not have anybody. They are kind of winging it.
Scotty: Need to have somebody and somebody in the background at a minimum, to get those basic security procedures in place, training if necessary. And then of course just IT hardware and support and things like that, I would think would be a minimum.
Bonnie: The education, yeah.
Chris: Another good minimum is a risk…
Kendell: It is like it is ongoing. Bonnie: Staff training is huge.
Chris: It is ongoing. A risk assessment is a great place to start. I mean, if you have never dealt with security and you want to start, get a risk assessment, get a firm that can do a risk assessment and they will give you a baseline of where you stand. You could be at the way bottom, but at least you will know what you need to improve on. You will know, they will give you direction on how to improve and it will help you to know where you stand and help you to move in the right…
Bonnie: I do love that you guys send us out those internal emails, trying to catch us. It is actually kind of humorous. I mean, I think it is perfect because we know that those are out there. And so, it does help because I cannot tell you how many times, I look at something and I am like, “Are they trying to get me?” But I would like to know, Chris, how are we doing at Sykes & Company, P.A.?
Chris: It is funny you ask because I just got the email over the weekend…
Bonnie: Do we pass?
Chris: … that shows me how well you did. And guess how many clicks there were on bad emails. Take a wild guess.
Scotty: All from Bonnie, Bonnie did them all.
Bonnie: Does it tell you who does them, because that is embarrassing. (laughing)
Chris: The email, it just gives me a quick overview. It just shows me clicks, it does not say who, but we only had one click.
Kendell: Oh, wow.
Well, see that shows you how important it is. And if you are educated and the staff understands what to look for…
Chris: And I have seen the trends. I mean, we have been on the user awareness training for, I do not know, maybe three-to-four years now, at least and I have seen in trends…
I have seen some months where there have been no clicks, but there is usually three or fewer clicks every month on bad emails, which is awesome. I mean, the user, I cannot stress how beneficial having the user awareness training is because it is the gateway drug, if you will, for hackers to make it into your network. it is the easiest way for them to come in.
Kendell: And I think I have two questions on that front, on that exact thing: for one, a lot of the bad emails probably do not even make it to our inboxes because you have already set up security.
I do not know if you could speak a little bit to what someone would need to do at a pharmacy level to kind of get that level of security, that initial defense so that a lot of bad items do not even get through.
Chris: Yeah, that is a great point, Kendell. We have email filtering. We actually have two filters.
We have what is called Proofpoint: it is a cloud-based email filtering service. So, it will filter out bad emails, bad attachments, bad links, a lot of that is filtered out. I would say 98% of the bad stuff. It does not even make it to our inboxes. However, it is not 100%. Nothing in IT as far as security software is going to be 100%.
And so, you plan for that 1% that is going to come through.
Office 365, I mean, I am sure a lot of pharmacies have Office 365 for email. Certain plans in the Office 365 infrastructure have built-in email filtering that you are able to use for free with your plans.
So, look into that, look into the plan that you have, if you are a pharmacy listening in, because you could already have it and may not know it. So, there are several options out there for mail filtering, for sure. And they also have, I think it is called, I am not sure there is a specific name, but it is basically link defense. So, when you click on a link in an email, certain Office 365 plans will scan that link before it loads on your screen and if it is bad, it will not load. And so, a lot of that is included in plans as well. So, a lot of protection is available out there that a lot of pharmacies may not realize they already have, just depending on what they use for email. But if you are on Gmail, a lot of pharmacies use Gmail, and the protections probably are not quite as good there as they would be in the Microsoft 365 infrastructure. So, something to think about.
Kendell: And my second question is, when I think of, before I took these trainings, when I thought about being attacked or hacked, I was imagining it was like Microsoft versus some bad guys and they are just coding. But then the term social engineering has been highlighted as really the main way people are getting in. It is not just people battling each other via code, but social engineering. And we have talked about it a little bit today, but if you could just, I do not know, highlight a little bit, the fact that how prevalent social engineering is when it comes to being hacked.
Chris: Social engineering is where the hacker plays with your emotions. They use your emotions. They use your weaknesses with your emotions to try and gain access to something. You may get an email that has, I am just trying to think of something,
I do not know, say save the hungry in another country.
They put a picture of someone that is hungry, and they need money donated because they have no food. They will play with your emotions somehow. And it makes you get interested; might make you click. And then one thing leads to another, and you may be wiring money to some other country, to a hacker. I mean, that is a crazy example, but that is similar to what social engineering is. They play with your emotions to try and get you to do something you would not normally do or click on.
It could be a phone call. You could get a phone call and be social engineered over the phone. “Hey, this is your bank, Bank of America. We are calling you because of this, this and this.” You have an unpaid fine or whatever it might be. And they will social engineer you over the phone and make you end up paying money or whatever over the phone. It could be a text message. They call it smishing, SMS smishing. So, you could be fooled over a text message somehow. So, a lot of different ways to be social engineered and it all goes back to awareness training.
So, you know what to look for. You have heard the, what is it? President Reagan said, “trust but verify,” that does not work in the IT world. It is, “Don’t trust, verify first.”
Bonnie: Then verify. (laughing)
Scotty: You talked on firewalls, Chris, mail filtering, let’s see, passwords: obvious.
We do not need to spend time. Do not have one, two, three, four, five, six, seven, eight, nine, 10 as your password. User phrases: “I like to play golf” or whatever.
Scotty: We are starting to see a lot of-
Bonnie: Now we know Scotty’s password.
Bonnie: You are going to need to change everything.
Scotty: Chris, what about MFA? We do a lot of MFAs here. Multifactor…
Kendell & Scotty: Authentication.
Scotty: Touch on that briefly if you would.
Chris: Real quick. Passwords: just be sure your passwords, I would say, are at least 16 characters, combination of letters, numbers, special characters, that sort of thing, and do not make it easy to guess. Use a password generator. You can just Google it and it will generate a good password for you. Multifactor-
Scotty: What are those password apps too?
Chris: Yeah, there are password apps. There is LastPass, there is 1Password… many password managers out there that are great and that I highly recommend any pharmacy to use. LastPass is what we use internally.
And multifactor, it kind of goes without saying, you should have multifactor, or it is sometimes called two-factor authentication on every single account you have. Bank, retirement accounts, it does not matter, email accounts. You want multifactor authentication on everything. It goes without saying, hackers have already… they can get around multifactor too, but it makes it a lot harder for a hacker to access an account if you have multifactor enabled. You can download Microsoft Authenticator on your phone, Google Authenticator, Duo… many different authenticator apps to use where you scan the barcode and then it puts a code on your phone. Definitely better to use the Authenticator app when setting up multifactor, than getting a text message code. It could work. Text message code is fine, but if you had to, if you can choose, always use an authenticator app, it is more secure than a text message code. So, be sure you have that set up on everything without a doubt.
Scotty: And Chris, what about sharing documents? We share a lot of documents here with our clients and use secure portals and things like that. And sometimes there are email requests and sharing documents can be a vulnerability for sure.
Any tips there?
Chris: Yeah, no. 1 tip is do not email an attachment, unless it is just something that is not important. If there are any numbers, data, especially PII-type of data, especially medical data, you want to always move that data through an encrypted method of transporting. So, we use what is called ShareFile, which is a file sharing service. And we can send documents back and forth to our clients, encrypted, basically, uploads it to ShareFile’s cloud, and then the client gets a link and then they can download it securely. That is just one way. There are many different ways, but you do not want to email attachments. If you can help it, always use some sort of file sharing service to send secure documents.
Bonnie: So, any of our clients that are listening, they can understand the reason why we do this. Now, if they do not understand it already, we are not just being a pain, we are trying to protect them to make them use ShareFile, there is a reason behind that.
Chris: Yeah, I mean, the number one thing is to protect our clients’ data. It is not to make life inconvenient for our customers or clients, it is to keep documents secure, to keep data secure at all times, but at the same time accessible; there is a fine line there. And so, we definitely have that as the no. 1 priority: keeping our clients’ information safe.
Scotty: And your patients’ data there at the pharmacy.
Chris: Right, it goes all the way through, yeah, for sure.
Scotty: And this topic is never going to go away.
I mean, as long as this digital world we live in, it is just going to grow and grow and grow and get more complex. So, these are things, if you are not doing anything, you got to do something.
Chris: That is right.
Bonnie: Can I give my bottom line? (laughing)
Can I go first?
My bottom line, my takeaway from this, because I have learned a lot too really is, I think, I guess the first would be an assessment, Chris, maybe just to see where you are. But then I think from the little bit of research I have done with pharmacists and this IT, and the things that I have seen happen with some of the clients that I work with, is, it really has to do with educating staff. Because like we mentioned, a lot of what happens in a pharmacy is going to come through on a phone call and email.
And if they are equipped with understanding what to look for, I think they will be in great shape, to verify, like we mentioned, before they move forward with anything like that.
Scotty: I will go next, I think my bottom line is, obviously an assessment of some sort. Outsource. Find an outsource IT that fits your needs, which is going to cover those basics and then awareness training. Kendell how about you, bottom line?
Kendell: My bottom line, I think that this IT and security especially is just going to be something ongoing. So, you have to have a relationship with somebody who knows what is going on, because I mean, we are fortunate to have Chris, but for the pharmacist, you have to have a relationship with somebody who knows what is going on, who can keep you up to date.
Scotty: All right, Chris, close this out. What is your bottom line?
Chris: I would say the bottom line is, like you guys said, get a risk assessment. Just get an IT assessment of any type. Make sure you have updated antivirus. Make sure you have a firewall. Get the basics in place, if you do not have that already. Do what you can to protect as quickly as you can. And then get some advice on how to move forward and begin adding in some layers over time to make yourself more secure as the years go on. You are not going to be able to pile everything on in the beginning.
Just start slow, keep adding a layer, here and there and continue to progress in your security posture and you will be protected. Your customers will be protected and you will be good for the longer term.
Scotty: Very informative, Kendell, IT discussion here. So, the Rx, or not the Rx assessment, but the IT assessment, Chris, you are willing and able to assist any pharmacies that have questions in this area. How can they get up with you?
Chris: Sure, I would be glad to speak with our clients. You can reach me at [email protected].
You can always call our main number (252) 482-7644 and ask to speak with me, and I would be glad to speak with you, see where you stand with your IT, maybe offer some guidance and just have a conversation on your IT posture as well as your security as well. So, I would be glad to speak with you.
Scotty: All right, well, appreciate you getting on today, Chris. Very informative and-
Kendell: Very, very.
Scotty: We will have to do this once again, because this one is not going away. So, appreciate everybody listening, take care.
Chris: Thanks, guys.
Kendell: Take care.