Meet Brian Weary, a refreshing presence in the often-grumpy world of IT. Hear how he provides pain-free solutions for businesses large and small, emphasizing ethical client relations and clear communication. Whether upgrading an old system’s RAM or reducing costly subscription seats, Brian’s advice is indispensable. Through heartfelt testimonials and expert insights, this episode navigates through the complexities of IT management, offering you simple, effective strategies to enhance your technology use.
SPEAKER 16 :
Walter? Upstairs! Are you alright?
SPEAKER 04 :
In the floor behind the chair.
SPEAKER 07 :
This is America.
SPEAKER 02 :
Does everybody know what time it is? Fix It Radio!
SPEAKER 13 :
And it is that time. Fix It Radio, KLZ 560. Thanks for joining us today. Happy Saturday, everybody. It is March the 15th. A little chillier outside. We’ve got some special guests with us today. Steve Horvath, which will be with us through Drive Radio as well. Good morning, Steve. Good morning. Welcome to Geno’s Auto Service. And then somebody new to us. I talked about him actually a couple of weeks ago. Brian Weary, Ease My Pain. He is our IT specialist on the business side. So I want to make sure I’m clear on that for all of you listening. If you’re a… Just a single user. You’ve got a computer, laptop, something like that. We’ll give you a lot of tips today during Fix It Radio on that end of things. But Brian’s specialty is working with businesses where they’ve got multiple computers and employees like Steve. You’ve got a network and all sorts of things going on and printers and computers. all sorts of stuff along those lines. So, Brian, thanks for coming in. Good morning. Thanks for having me. Appreciate it very much, as always. Thank you. And Brian and I have known each other for quite some time now. And I was just telling Brian and Steve both because I golf some. I call myself a Z golfer. I kind of go back and forth. That’s kind of how I… I’m not very good, in other words. Now, these two guys, I can tell you right now just from talking to them, I know Steve’s a good golfer and I know Brian is as well. So these guys could go out there and play and do very well. Yeah, we may leave soon. So, no, thank you guys for joining us. I appreciate it. Again, Fix It Radio, if you guys are listening on Tuesday, thank you for listening Tuesday as well. We appreciate it. You can always text us a question, 307-282-22. Don’t forget, you can call our main line as well and ask a direct question, 303-477-5600. All right, so Brian is our resident… IT guy, and again, on the business side, but you see everything, and just because it’s business doesn’t mean there’s not things that correlate back over to the homeowner end of things. And not to put you on the spot, but when it comes to what you see as probably, how should I ask this? What do you see as being the most common bad practices? So I’m going to get into that to start with. What do you see as being the worst bad practices that a lot of users have, which means if they’re doing it at work, they’re doing it at home, and it’s probably carrying on in other places. In other words, if they’re doing it as a particular family member, others probably are as well. What do you see as being some of the worst practices?
SPEAKER 08 :
Probably impatience with email, reading your email too quickly. We get tons of email. We all do. Spam, legitimate email, you name it. But we’re in a hurry. We see an email and we go, oh, I’ll just open that up real quick. You have to take your time, whether you’re in the business or at home. And that goes for anyone, me included. I mean, you just get busy and before you know it, you get bombarded. And if you’re aware of that and you slow down that practice, it can eliminate a lot of issues.
SPEAKER 13 :
And I’m guessing because a lot of the nefarious things that are out there. the phishing scams and so on, they’re coming through the email. I mean, that’s one way. We’ll talk about some other ways they’re coming in, but that’s one way they’re coming in, right? Yep. Probably for a resident home, that’s the number one way.
SPEAKER 08 :
Okay. And they know you’re going to be interested in an email if they just word it a certain way or whatever it is.
SPEAKER 13 :
Okay. Now, is it the email itself or is it attachments that are coming through the email? What do you have to be careful of there?
SPEAKER 08 :
Used to be attachments more. Now it’s the links inside. So it’s that, okay, in the subject line, whatever it says, you know, hey, sign up for a free $100 gift card or whatever it is. Click on this link. And, you know, we’ll talk about it, but a lot of times it seems suspicious. But when you’re, again, when you’re rushing, when you’re just going through your emails and you’re like, oh, there’s an interesting one.
SPEAKER 13 :
boom your hip can we were talking a moment ago because at the car end of things CDK which was the big dealer service company that to actually was a spin-off of ADP which I did not know until reading it a little bit ago and how bad that was last summer for all of us in the auto industry that was a 25 million dollar ransom that they actually paid to get things back because the ransomware the somehow infected their entire system in Brian that is a
SPEAKER 08 :
big deal yep it’s ransomware is still the number one threat out there it’s not as much as it used to be but it’s still the number one threat okay um and you know they’re not going to attack a lot of times they’re not going to attack a typical home user um they’re going to attack a business where they know there’s more resources right exactly but it’s still the number one Correct. Okay.
SPEAKER 13 :
So on the business side, let’s talk about that for a moment because there’s a lot of folks out there listening that have businesses. And, again, if you’re somebody listening that you’ve got a business, you’re looking for somebody to help you on the IT sides of things. And as you can tell from talking to Brian, the biggest thing that – and Brian had come to me years ago and said, hey, I want to start a business. And he listened to my show during the day and so on. So we met. And at that time I said, well, you’ve got a few things you need to do first. You’re not quite ready. Let’s do these things. And then when you’re done, come back. And to Brian’s credit, he did exactly that. Everything we talked about doing, he did. We then sat down again, had another meeting, and I said, yeah, okay, we’re ready. Let’s get rolling. And the biggest thing about Brian that I appreciate, and some of you out there listening will appreciate this as well, and please, if you’re in the IT world, I know not everyone is this way, but far too many IT experts are grouches. I don’t have any other way to say it. You call them on the phone, you get this, well, is it on? Did you reboot? They’ll just literally, they’re about as mean and nasty as it gets to the point where, for some of you listening, you know exactly what I’m talking about. Some of you even have internal IT people in your own company. You hate contacting them. Because you know you’re going to get some sort of a, you know, scolding as to, you know, why such and such happened. And it’s all your fault, of course. And so you don’t even want to call him in the first place. I will tell you right now that Brian and we ease my pain. The reason why we called it that is because we’re going to ease your pain when it’s all said and done. And no, you’re not going to get yelled at. You’re not going to get scolded. You’re not going to feel like a heel after you’re done talking to Brian or any of his people that work for him. because that’s not how we’ve, I say we, because I’ve been involved in some of this with you, we’ve not set things up that way. We want it to be completely the opposite of that. Exactly. And so those of you listening, trust me, if you’ve got an IT person where you’re just like, you know, I just hate calling them, or every time I do, I just feel like, you know, a number, or I’m going to get yelled at for whatever, call Brian. Brian will take care of it. You can find him on our website, fixitradio.com. Real quick, Brian, what’s your phone number? We’ll give that out really quick as well. Sure, thank you. 303-747-6767. Okay, so if you’re a business, you’re looking for somebody to help you out on the IT end of things. One other thing I want to mention really quick along those lines, too. Some of you might even have some of the larger companies, and I’ll just say it. LaJuan, some of those that are out there that do IT services, and you’ve hired them to be your IT person. Let me tell you what. Call Brian. Get a price from him on what it would take to do the same thing the other guys are doing that, frankly, you probably never see. Because Brian, you will see on a routine basis, because he’s going to roll through your business occasionally and make sure things are dialed in. And if you’ve got any questions, he’s going to be right there on hand to help you with whatever it is. You’re not getting that from the big guys that you probably have a contract with right now. So if you’re somebody along those lines, then go ahead and talk to Brian instead. So hang on. My wife’s texting me, I think, along these same lines. And she works for a big company. And she said, yeah, his name is Jen in Philly. There you go. In other words, everybody has experienced gin and Philly because they’re just awful to try to call on the phone and deal with. And every company has them in it for the most part. And that’s why Brian is completely, and I mean this, folks, completely the opposite when you go to get IT work done from him. And I mean that sincerely. Appreciate that. Anyway, so going back to the whole, you know, the business end of things, email folks opening things that they shouldn’t. And this is a question I had even. I don’t know how the CDK thing happened in the first place. But is it possible that that particular, you know, hacker, that particular ransomware group got in through a backdoor email, something along those lines? Or how does that typically happen?
SPEAKER 08 :
Yes. And there’s a story. I believe it was LinkedIn, that company. um they had they had a worker go home and work from home and didn’t wasn’t paying attention he was on a work computer email came in he opened it they had an entry into the company and they hacked them so yes it can happen anywhere okay and yes it can happen through it typically happens through email because you’re not Yes, they can go through a browser, and yes, you can click on things in a browser, but that’s still the number one way that they get you, and it’s usually a phishing attempt.
SPEAKER 13 :
Okay. Good to know. So for those of you listening, we’ll give you more tips and tricks as well. Joe, go ahead, sir.
SPEAKER 04 :
John, just a suggestion that Brian could probably do for very little money regarding RAM. My desktop computer at home is about five years old. At the time, I was just using it for Word and Excel and stuff like that. Then my wife started playing these, you know, online games, which are fine, but I noticed the computer, when she did that, the game, the computer would slow down, and then I would look at the RAM memory, and she was using like 90% of the RAM, and I think the machine initially only came with, Brian, help me, is it gigabytes or megabytes for RAM memory?
SPEAKER 08 :
It’s gigabytes these days, yes, gigabytes.
SPEAKER 04 :
Yeah, it came with 32, well, she only had like four, you know, four gig left when she was playing these games. So, you know, putting in a bigger RAM chip takes longer to unscrew the case than to insert the chip. And I think it cost me all of $80. You know, I just brought the base unit into a, you know, I called them up. I said, this is what I need. Do you have the chip on the shelf? Yep, I do. Went down there, took the case off, put the new chip in, and bang, it quadrupled the speed of the computer. So, you know, more and more apps are using more and more RAM chips. And I don’t know what you would charge to put a bigger RAM chip in.
SPEAKER 08 :
Not much. You’re right, it’s a very inexpensive way to… Didn’t used to be. No, oh my gosh, no. A typical, like 120… Back in the, even 10 years ago, it was megabytes. So, like a 128 megabyte chip would cost you 150 bucks. Back in the day. Yep. Now you can get a 16 gig…
SPEAKER 04 :
a ram chip for 30 bucks depends on where you get I’m just yeah that’s an approximate but right um yeah oh it’s a great way Joe to um to quickly update your computer without having to buy a new one yeah so again my suggestion is if you have a four or five-year-old computer that’s getting slow um you know you probably are ram upgrade which you could probably do depending how much ram you want I think I paid maybe with tax a hundred bucks to quadruple the RAM in my desktop computer. And it was, you know, it wasn’t drop it off and come back in three days. It was wait right here. And it was literally six or seven minutes while he took the case off, you know, pop the new chip in. Great point. So it’s just a cheap… Fantastic upgrade if you’ve got a four or five-year-old desktop.
SPEAKER 13 :
Joe, appreciate you, man. And along those same lines, those of you that have businesses where you may have something along the lines of what Joe just talked about where you’re like, listen, I’ve got a workstation that maybe needs to be upgraded or maybe I need to put a whole new one in. Well, maybe you don’t. Maybe there’s a few things along the lines of what Joe’s saying where you could save some money and not have to replace all of that hardware anymore. And the other thing, too, that Brian’s big on is helping you all when it comes to your subscriptions. How many Office 365 seats do you have? Do you need all of them? There might be ways around that to where you could condense some of those down, save some money. There’s all sorts of things in that world that you can look at. And, Brian, that’s what you do for businesses on an ongoing basis. Correct. One of the first things you do when it comes to a new client, especially.
SPEAKER 08 :
Absolutely.
SPEAKER 13 :
Let’s analyze everything you’ve got going on and Where can we save you money and what can we do to make you more efficient? All right. Jeff in western Montana. Go ahead, sir.
SPEAKER 05 :
Hey, good morning, Jim. Good morning. Years ago, I was listening to a different show down in Colorado Springs. I can’t remember which show it was now, actually, if it was national or local. But it was a guy who said that if you have an older version of software, and he was at that point, He was talking about, I think, Windows XP. So, I mean, that’s how far back we’re going, over 20 years. There’s a lot of devices out there that still run XP, things in gas stations and stuff. I don’t know if they’ve upgraded now, but 10 years after it had not been supported, a lot of devices are still running it.
SPEAKER 13 :
That’s because it was one of the most stable OSs they had, by the way. I miss it. Yeah, it really was.
SPEAKER 05 :
Right. So here’s what he suggested, though, for any operating system, and I do this on online weather. I’m pretty much exclusively Mac these days, but when we had some Windows laptops, is that you have two accounts. If you are the only user on the computer, you have two accounts. One is your normal day-to-day account that you do stuff in, and the other one is an admin account. And that admin account allows you to make any of the changes and access stuff and like passwords and different things. And so you operate on day-to-day out of your regular account, but you keep everything that a hacker would want only available through the admin account.
SPEAKER 13 :
Yeah, good way. It’s a good way of doing it.
SPEAKER 05 :
That actually came in handy because I came home one day to find my wife kind of – in a panic because this flat pop-up had come up on the screen saying, warning, your computer is compromised. And she had called the number and was talking to a guy and trying to give him the password for the system, but she couldn’t because she didn’t have admin privileges.
SPEAKER 13 :
Good.
SPEAKER 05 :
And I immediately hung up the phone and explained to her what had happened. It was a phishing attempt, don’t do this anymore.
SPEAKER 13 :
That’s right.
SPEAKER 05 :
Couple minutes later, I get a call back from a guy, yeah, we were inadvertently hung up, or disconnected, and I said, no. Not inadvertently. I hung up on you because I know you’re a scammer trying to get stuff, and I’m not gonna let you do that. And there was dead silence on the phone for a second or two, then I heard a little shuffle, and he hung up.
SPEAKER 13 :
Yep, yep. Good job, Jeff.
SPEAKER 05 :
It’s personal, it works. Have two accounts.
SPEAKER 13 :
Yep.
SPEAKER 05 :
I’m working right now on my iMac out of my personal account. And I can access all my banking stuff, right, VPNs and things. But if anybody wants to access any of the underlying stuff, I need to remote into your computer. Oh, no, you can’t because that’s an admin privilege. And a normal user doesn’t have that. And you can set that up for every user. If you’ve got a wife, a couple of kids, and they’re all using the same computer. Yep. They can each have their own account, and they can have user accounts, but never admin privileges.
SPEAKER 13 :
That’s really kind of what, frankly, Jeff, I mean, and Brian can attest this, that’s the way businesses are done and handled is, you know, the admin, none of the users in know that account or how to get into those things. That’s all done through somebody like Brian or maybe the owner of the company, and then everybody else just has a user account with certain privileges according to what they need to do or not do. And so what you’re doing, Jeff, is exactly what happens in the business world, which is how it should work. Correct. Local admin account.
SPEAKER 05 :
Not only the business, the government, when I was working as a defense contractor at the field, We could not even plug in any USB device, whether it was a thumb drive or not. The computers were locked down so hard that the computer security desk on the base would get a notification. You know, you could get, like, little heating pads for your coffee cup or fans to blow air if it’s hot. If you plug those into your computer, you’d get a call, what have you plugged in? And, I mean, you know, things, they took it that seriously. So… I thought a lot of that was a little bit over the top, but it wasn’t my government job to say anything else. So you just comply until you quit. But yeah, it’s anything you can do to make yourself safer like that. Absolutely. And that has just been, I mean, it’s so simple. You set up an admin account. It’s the only one that has admin privileges. Everybody else is a user. It’s So I know who it was. It was Leo Laporte. That’s who it was, the tech guy when he had a show on the radio. And that was his suggestion. So I’d like to pass that on.
SPEAKER 13 :
Good suggestion, Jeff. You bet.
SPEAKER 05 :
It works.
SPEAKER 13 :
You bet. Thank you, man. Appreciate you very much. All right, let’s do this. We’ll take a quick break. We’ll come back again. If you’ve got any other questions or comments on this, please let us know. 877-477-5600. You can text us as well, 307-282-22. We’ll be right back. Myself again, Brian Weary from Ease My Pain with us today. He is our IT specialist. Steve Horvath, Geno’s Auto Service with us as well. We’ll be right back. This is Fix-It Radio, KLZ 560.
SPEAKER 10 :
Do you have more month than money? The cost of everything is going up, except your income. How about some relief? Take AIM, Affordable Interest Mortgage, 720-895-0500. Do you have a great rate on your first mortgage, but household debt is swallowing the rest? Rates are falling. Lower your monthly debt $700 to $1,100 a month. Call AIM, 720-895-0500. When you lower your household debt $700 to $1,100 a month, you are still able to pay off your home in the same time frame, sometimes even faster. Let our 23 years of experience help save you money. Remember, saving interest is money in your pocket. Take AIM, 720-895-0500. Tired of paying high interest rate on your credit card debt? Think about it. Bills paid, money in the bank, less stress. Affordable Interest Mortgage, 720-895-0500. Give yourself a raise and keep more of your money. That’s 720-895-0500, where it’s all about you. Regulated by Dora and MLS, 217-147-Equal Credit Lender.
SPEAKER 02 :
Looking for top-notch home, auto, classic car, and business insurance? Look no further than Paul Leuenberger. Paul is now an insurance broker with access to industry leaders like Hartford, Travelers, Safeco, Liberty Mutual, Nationwide, Allstate, AIG, Chubb, Pure, Berkeley, Grundy, and Hagerty. Paul has you covered. Paul is also proud to continue his work with American National for all non-property insurance needs as well. Paul Leuenberger now serves Colorado, Wyoming, Arizona, Nevada, and Texas, with more states on the way. Paul’s mission is simple, to connect you with the right coverage at the best value. Are you ready to protect what matters most? Call Paul Leuenberger today at 303-662-0789. That’s 303-662-0789.
SPEAKER 15 :
You’re driving down the road and out of nowhere comes a bang. A huge rock just hit your windshield and now you have a star in your windshield. Did you know that chip can be fixed? But who is the best? Who has the best resins that keep developing them to work with the newest windshields? That would be Novus Autoglass. Novus, which is the Latin word for innovate, invented windshield repair in 1972. and it still leads the industry in cutting-edge technology, backed by more patents than any other repair and replacement company. While other glass repair services offer limited warranties, or worse, none at all, you can trust the original Novus pros to stand behind their work with a full refund that you can use towards a windshield replacement for the life of your windshield. Find a Novus location near you by going to any of our websites, ready-radio.com, drive-radio.com, or fixitradio.com. Just click on the Novus link. That’s Novus Autoglass.
SPEAKER 13 :
All right, we are back. Fix It Radio, KLZ 560. Today, really, all about keeping you safe online. And then those of you that have businesses, if you need some help individually, please give Brian a call. Ease My Pain is the name of his company. He’s happy to help you out. Real quick, before I go back to Joe, also of late, and this is something that all of us in the room have received, meaning a lot of you out there probably has as well. There are a lot of scammers now doing texting. One of them of late, in our area at least, maybe this is nationwide, but one of the areas of late that I’ve noticed here is pay your toll. You owe this, click here, pay your toll. And it’s a text message that’s come in. I haven’t found one of those yet to be legit. That’s an automatic delete report as junk. I have an iPhone, and you can report it as junk, and hopefully that number then gets blocked. But those guys are sophisticated. They’ll still keep rolling in with other numbers and so on. They do burner numbers and things like that and do everything they possibly can to try to get in. So that’s another thing. And here’s the thing. If you think you owe a toll, then go online, log into your account, Figure out whether you do or don’t. But do not click that link on a situation like that. Same with Xcel Energy. Same with IRS. Same with anybody along those lines at all. You are not going to receive anything via that way. You are going to get it in the mail. And that’s how that happens. And Brian’s over here agreeing with me.
SPEAKER 08 :
Let me add this. If you get that phone call, alluding to what Jeff was talking about earlier, if you get that phone call that something’s happening on your computer, don’t take it. Yeah. You know, go to – take your computer to – if you have to, take it to – Well, first thing you do, unplug it. Unplug it.
SPEAKER 13 :
From the wall, everything. Just shut it down. Correct. Because they’ve – Somehow you’ve been compromised. Correct. So unplug everything and then take it in and have somebody do a wipe, if you would, of that. Get all those things off of there and do not talk to anybody on the phone. Right.
SPEAKER 08 :
They’re not calling to fix something.
SPEAKER 13 :
No, they’re calling to get your money.
SPEAKER 08 :
Yes.
SPEAKER 13 :
They’re trying to scam you out of as much as they possibly can. I had a family member recently that was caught up in a situation along those lines where luckily it was caught prior to a very large sum of money. going out. And in this particular case, they’d gone to the bank, even had the wire set up. Fortunately, the bank was extremely cautious and said, yeah, we decided not to send that wire because we figured this wasn’t accurate. And long story short, when the scammers found out the wire had been stopped, they were irate. Irate. And keep in mind, too, really quick, I’ll make sure I mention this, too, because most of you don’t know this. The scammers that we’re talking about, these aren’t single individual guys in a wife beater and a bag of Cheetos in a basement. That’s not who’s trying to scam you. There might be a few of those guys out there, but the majority of these are in what I call slave factories around the world. These are indentured servants in most cases that are working some debt off that they owe somebody, whether they borrowed money or some family member did something or there’s a threat against the family, so they’re working that off, whatever the case may be. The majority of these people trying to scam you are literally working for their lives to try to get out of whatever they’ve gotten themselves into. And that’s why they get really upset if something goes awry because their whole quote unquote livelihood and sometimes lives depend upon scamming you. But not my problem. I didn’t get there. I feel bad. But that doesn’t mean that I’m going to get scammed and participate in these things. But yeah, most of these people are indentured servants. Literally, I’m not exaggerating when I say that. And when you look at it that way, you’ll understand why they can be so pushy and aggressive as they are at times. So, Joe, go ahead.
SPEAKER 04 :
All right, three quick things. If you’re not, you know, how much hurt would you be in if your computer hard drive crashed and you didn’t have a backup? You know, backup hard drives, Brian, what are they going for these days, 60, 70 bucks?
SPEAKER 08 :
Yeah, and I’m glad you brought it up because we need to talk about ways to prevent all this stuff. And a backup is number one, not only from hackers, but spilling something on your computer, losing your computer, having it stolen. That data is just sitting on your computer. So, yes, you need to have a backup. And, yeah, there are inexpensive solutions, both external hard drives, cloud-based backups, if you’re comfortable with that. So, yes.
SPEAKER 04 :
Yeah, I’ve got a, I do mine on my home desktop every, once at the end of every quarter, I’ve got a calendar reminder that says back up hard drive. So, you know, December 31st, March 31st, you know, and it takes me about five minutes to back up my folders to my hard drive. That’s one. Second, in scams, if you ever post something on like Castle Rock neighbor to neighbor or next door and you put your email address out there, and you get a text from somebody who says, I’m interested in the item you’re selling, but I want to make sure you’re not a scammer. I’m going to send you a verification code. Please reply back. Well, what they’ve tried to do, since you gave them your email address, they’ve tried to log on to your email account. They’ve clicked on, I forgot my password, and then they’ve asked your email provider to send a verification code to them. Well, As soon as you reply back with that verification code, they’re now into your email account. So don’t ever reply back when they ask you to validate a verification code. That’s a scam. And last but not least, if you’re going to keep a list of your passwords, I have a three-page list. I must have 55 passwords, and it’s on a three-page Excel spreadsheet. If you’re going to keep that on your computer, which could get hacked, you can protect an Excel spreadsheet with a rather sophisticated password if you’re going to keep it on the computer. But what I recommend you do is rather than keep it on the computer itself, keep your password spreadsheet on a thumb drive along with all your tax return information. Because say your spouse does allow a hacker to gain access to your computer, if you’ve got a password list in your tax returns on your hard drive and they’ve gained access to your hard drive through this pop-up scam, You’re really screwed. So I don’t keep that stuff on my hard drive, but if I were, I was going to protect the Excel spreadsheet. It is a feature in Excel where you can password protect the spreadsheet, but you’re better off just putting it on a thumb drive and not having your tax returns and your password list. on your hard drive.
SPEAKER 13 :
I actually have a better idea, and I’ll get Brian’s thought on this. For those of you that have Apple, you’ve got built-in password generation and storage and all of that with what Apple gives you. If you’re on Android, you can actually get an app that will do all of that for you. My advice, Joe, is use those password generator apps and then store all of your other passwords inside of that and then just make sure whatever you’re using to open that initial password app up is secure and you don’t have to do anything else. Correct.
SPEAKER 04 :
Yeah, and by the way, a great password for people who have trouble remembering it is your car’s license plate number followed by the day of the month you were born on. So say your password’s 647BZ3, and you were born on the 15th of the month. 647BZ315 is a great random password, and it’s one you can always remember.
SPEAKER 08 :
Hopefully that’s not yours, Joe.
SPEAKER 04 :
I wasn’t born on the 15th, and that wasn’t my password.
SPEAKER 13 :
Good one.
SPEAKER 04 :
You should know your car’s license plate number.
SPEAKER 08 :
Everything you’re saying, Joe, is simple, and it’s very true. You hit it right on the mark. And what John said as well. I’m not making a plug, but there are other password managers like a Bitwarden. that will do those kind of things. So protect your passwords. But don’t, here’s the thing, another thing that I’ve learned is that, and I’ve been guilty of this, your browsers save passwords. Well, those passwords, guess where they are? They’re saved on your computer. Yes, you can sync your browsers through Gmail and through Edge browser and things like that, or the Chrome browser, I should say. But keep in mind that’s on there. And there’s been people that have been able to hack in and find the secure password that unlocks that, and then they get all your passwords. So a password manager, an Excel spreadsheet, like you said, Joe – the deal that you have on Macs. Those are all really good ways. The other thing I want to say is that passwords, if you’re creating passwords now, or obviously we all have tons of passwords, it’s really important that they’re complex. And a lot of people roll their eyes and go, oh gosh, I don’t want to go through that. Well, let me just give you a couple of quick statistics. If you have four characters and a password, it takes a hacker nine seconds to find that password. They have tools. I’m not going to get into that. They know what they’re doing. If you have seven characters, it takes… Now, let me rephrase that. If you have a password that has numbers, uppercase and lowercase characters and symbols, I’m going to say this again, four characters of that, it takes them nine seconds, even if you have that complexity. Seven characters takes them one month. Okay. Eight characters takes them seven years. Nine characters takes them 479 years. So keep in that mind.
SPEAKER 13 :
So keep it complex.
SPEAKER 08 :
Keep it complex and keep it at least seven, eight characters.
SPEAKER 13 :
And my feeling, guys, really is, and Joe, great advice, but all of these password generator programs that are out there will make them so complex that because the way they store it and so on, you’re not having to remember anything. And by the way, most of these places, if you do in fact forget one, They’re an easy reset and come up with another complex password. Some websites or some logins, depending upon who it is, will make you even change periodically anyway. So use a password generator. It’s so much easier. I’m done learning. I’m done learning and coming up with passwords. I don’t do that anymore. Yep. And then you have a master password.
SPEAKER 04 :
The only reason I do the password list is my wife occasionally will go on one of her shopping sites to try to get her to log on to access an online password storage. She just wants to pull out a piece of paper out of the file folder. You know, because it’s, you know, I don’t know how many spouses are as challenged as mine when it comes to computer proficiency.
SPEAKER 13 :
Well, I think we all run into that, and not plugging Apple, but the advantage Apple gives, if my wife all of a sudden says, hey, I need the password for such and such, I go to the password program, I scroll through that particular site, I grab it really quick, I screenshot that to her, send it off, and we’re done. It’s that simple.
SPEAKER 04 :
Yep, and Apple has great encryption. Yeah, but sometimes I’m… But sometimes I’m not reachable, John, and if I’m in the gym and she needs a password, I’m not accessible to tell her how to do that. So I just leave a printed copy in the desk drawer next to the desktop computer in my house. And she’ll just – so I agree it’s a great thing to have and I would do it, but in terms of a lot of spouses, they’re going to want a hard copy printed out somewhere.
SPEAKER 13 :
My only concern with that, and this is just because of some things that have even happened to us lately as a family and so on, I don’t want a hard copy copy anywhere that somebody could rummage through, grab, and then have moving forward. You’re bolder than I, Joe. In other words, you’re willing to take that risk. I am not.
SPEAKER 04 :
Okay. Good point. Yeah. And in our situation, I don’t think our house is unoccupied for four hours a month. Either my wife or I is all we’re there. So I don’t think the risk in our case is as big as yours might be, John.
SPEAKER 13 :
Well, and again, I had two cousins that about two weeks ago didn’t think it was any risk at all that are now dead. And we’re home when that happens. So you never know. All I’m saying to everybody out there listening, be extra careful and cautious, especially with all of this stuff. I don’t trust the world, Joe.
SPEAKER 03 :
No, and great advice, John. Great advice.
SPEAKER 13 :
Appreciate you, man. Very much, Joe. Bill, you’re next. Go ahead, Bill.
SPEAKER 03 :
Hey, just out of curiosity, because I got two comments. You know, for my passwords… I bought a small address book, and I just use that.
SPEAKER 13 :
Yeah, I’ve had some family members that do that. The only issue, Bill, is we’re back to what we just talked about with Joe a moment ago, is if somebody gets a hold of that some way, somehow, now they’ve got everything you own.
SPEAKER 03 :
Then they’ll probably be dead.
SPEAKER 13 :
Well.
SPEAKER 03 :
Because that means they came to my house and whatever happens after that.
SPEAKER 13 :
Yeah, I mean, yeah. And I hope that doesn’t happen, Bill. I mean that sincerely. I wouldn’t wish that on anybody. But that, again, personally, that’s my only concern with written down passwords and things of that sort is somebody else can end up with them.
SPEAKER 03 :
So now as far as doing the access code, I just did it yesterday with somebody. But it was with Norton, and I called them up.
SPEAKER 13 :
That’s fine. If you’re calling somebody and you initiated everything, yeah, I wouldn’t have a problem with that, Bill. But never, ever, ever give anybody a code that is just randomly sent to you.
SPEAKER 03 :
Okay. Hey, thanks a lot.
SPEAKER 13 :
Good stuff. No, Bill, I appreciate it. And I’m sorry to be so hard on the password thing, guys. I just, you know, again, some of the recent things that have happened to our family of late, I just wouldn’t go that route. I would use some sort of a program and generate these things electronically, and I would not keep anything paper-wise stored along those lines for that reason. Mike, go ahead.
SPEAKER 07 :
Hey, interesting discussion on passwords. One of the companies that I was involved with, had a former NSA IT guy, naval intelligence, NSA. And he said, if it’s on a computer, I can hack it pretty easy.
SPEAKER 13 :
Yeah. Given enough time. Absolutely. Yeah.
SPEAKER 07 :
Oh, he didn’t take it much. He brought us all in one day and said, Hey, Everybody, you know, tell me here. And it was amazing. It took him about two hours.
SPEAKER 13 :
Wow.
SPEAKER 07 :
Wow. But he was stunning, probably why he worked for NSA. Now, in deference to your opinion, he said, I would keep my passwords on a notebook locked in a safe.
SPEAKER 13 :
That one I would be okay with, Mike. That way somebody would have to get into the safe to then get to that. Yeah, that one I wouldn’t have any issues with. That would be fine.
SPEAKER 07 :
And that’s what he did there, and we changed passwords every two weeks.
SPEAKER 13 :
That was law. And that’s something, Mike, I’m glad you said that because, frankly, probably myself included, some I don’t change near enough.
SPEAKER 07 :
He said it needed to be done at least every three months.
SPEAKER 13 :
Yeah, and you know what? His rule of every couple of weeks gets kind of burdensome, but not a bad rule.
SPEAKER 07 :
Well, but that was, and he would come in and help us do that. He was right in the office.
SPEAKER 13 :
Great idea, though. As you know, Mike, I’ve done this on Rush to Reason during the week, and I cannot tell you because it’s not in front of me, but one of the biggest password used is password. Or 1, 2, 3, 4, 5, 6.
SPEAKER 07 :
And hackers know that stuff, Mike. Well, you know, the other thing, John, that I personally find disconcerting and I don’t like it is all my doctors want you to go to the portal.
SPEAKER 13 :
Right.
SPEAKER 07 :
He used to tell us, he said, those are the easiest things to hack into. Wow. In hospitals and all that. He says, I don’t care how many encryption times you do it.
SPEAKER 13 :
Wow.
SPEAKER 07 :
It’s not tough. And he said, the problem with that is everything in your life is there.
SPEAKER 13 :
Yeah, good point. Great point.
SPEAKER 07 :
He was adamant about that. And when I tell people, they say, well, do the MyPortal. I said, well, I don’t need another password because when I get another password, then I have to go to the safe.
SPEAKER 16 :
Right.
SPEAKER 07 :
And they say, oh, it’s so convenient. Yeah, I got to go to the safe. I know it’s not. I got to get the book out. I got to look at it. There’s nothing convenient about it.
SPEAKER 13 :
Great point. Great point.
SPEAKER 07 :
But anyway, sorry.
SPEAKER 13 :
No, I can’t argue that. You’re spot on, Mike. Appreciate it very much. I mean, this is a big topic, as, Brian, you can… Tal, and again, knowing you and knowing what you do inside of companies, I’ve got to believe that’s one of the first things you look at. It’s like, okay, give me your password list and let’s look at it and see exactly what it is because it needs to be probably way more secure than they’ve got it.
SPEAKER 08 :
No question. I mean, we talked about ransomware, but passwords are right up there as the second biggest threat. And these tools that these guys have to figure out passwords, as I mentioned earlier, are All those things you guys just talked about are good. They’re good things. They’re inconvenient, but it’s worth it. Right. And the other thing I would say is any of these sites, and most of them are doing now, whether you’re logging into Gmail or Office 365 or whatever, they’re offering multi-factor authentication.
SPEAKER 01 :
Right.
SPEAKER 08 :
MFA. You need to do that. Yes. I’ll be honest, up until the last year or so, I would just kind of bypass that. It was inconvenient to me.
SPEAKER 13 :
Pain in the rear.
SPEAKER 08 :
But it is absolutely one of the best ways to protect yourself. Yes, absolutely. Any cybersecurity company will tell you that.
SPEAKER 13 :
Absolutely. Kyle in Dallas, go ahead, sir.
SPEAKER 06 :
Hey, how are you doing today? Good, sir. said it had a quick question for brian just in passing a minute ago you mentioned that warden uh… i know there’s all kinds of password managers out there on the market nord pass and a lot of others do you know is there a reason why you are you like that warden uh… mostly just the ease of use of it
SPEAKER 08 :
Honestly, setting it up, it’s really straightforward. A little setup wizard takes you through it, lets you set up a master password that you could put in a safe, actually. There you go. And so it’s just ease of use. There are some other good ones. There’s no doubt about it. I would do like we all do, like you’re buying a product. I would go online and see what kind of the reviews they are. There’s some really good reviews out there, but Bitwarden’s usually reviewed as one of the best reviews.
SPEAKER 06 :
Okay. Well, I just figure you being in the industry and all your experience, there’s a reason why you would pick that one.
SPEAKER 08 :
Well, and I will say also, that’s a good question. Not only ease of use, but I go to cyber seminars quite a bit, and the last one I went to, that’s what they recommended. And after a lot of discussion, I was like, okay, I’m all for it.
SPEAKER 06 :
Oh, okay. All right. Well, I do appreciate it. Thank you.
SPEAKER 13 :
Kyle, thank you very much. Appreciate you calling in all the way from Dallas as well. Jeff, go ahead, sir.
SPEAKER 05 :
Hey, sorry to tell him again. No, you’re fine. Hey, Brian, have you ever heard of a guy named Bruce Schneier?
SPEAKER 08 :
I have not.
SPEAKER 05 :
Okay, he’s actually a nationally renowned cybersecurity guy. He has done a lot of work on the basic encryption algorithms that NSA uses in terms of trying to validate their strengths. But he has a password safe. The reason I ask is he has a password safe that I’ve used for over a decade now. It’s PW Safe, and it’s out there. It’s very cheap. It used to be free. You could download it, and now it costs a couple of bucks on all the stores.
SPEAKER 13 :
Good to know. Good to know. Nope, we just lost him. He’s probably on a connection just now. Go ahead, Steve.
SPEAKER 14 :
How does a face ID help him now with that? So, you know, so much of our phone is a face ID. That works really well.
SPEAKER 08 :
Yeah, I’ve heard of no, at this point, I’ve heard of no issues with that.
SPEAKER 14 :
But you can tie that through your passwords then.
SPEAKER 08 :
Yes, you can.
SPEAKER 13 :
Correct. Yep. Yeah, for example, the app that I’m referring to, yeah, you’re not getting… at least in my case, you’re not getting into that without having either my face ID, the password to my phone itself, which you’d have to also know, or the password to get into my computer or my fingerprint, because my computer you can get in with a fingerprint or you can get in with actually my master password, which that one I do, to my own credit, I do change that one about every two to three months just because of everything we’re talking about that is one of those master passwords I will change periodically and the other thing i learned a long time ago too where if it’s something like that where you’re you know you’re not even wanting to write it down or do things along those lines and i was taught this by another i.t guy outside of brian use phrases yes i i like hot coffee with a couple of exclamation points or something along those lines and and and be creative in you know i like hot and maybe hot instead of the letter o is zero things like that so you can get really creative on a few things like that where that’s a password you really can rattle off right off the top your head you have to remember it and it can be easy and that’s again a long character password where you know you can go as long as you want on a phrase but if you remember that phrase and it’s really easy down the road remember what that master password is and if everything else is stored the way I’m talking or you put it in the safe or you do whatever that’s completely up to again however you do this is up to you my point is just don’t use one two three four five six seven eight or one two three four or password or password with an exclamation point or whatever because those are the easiest ones and by the way are still one of the highest uses of passwords that are out there all right we’ll take our second break don’t go anywhere we’ll come right back this is fix it radio klz 560.
SPEAKER 12 :
Looking to buy or sell a classic car? Need a reliable valuation you can trust? Look no further than BP Appraisals, LLC. With over 20 years of experience in the appraisal industry, we provide fast, accurate, and professional appraisal services that you can count on. Did you know that an appraisal can also entail the forecasting of monetary earning power? An appraisal is a document with a valuation conclusion. It is not a pre-purchase inspection, a mechanical evaluation, or a recommendation to buy or sell your vehicle. It’s the actual value at that moment in time, which many need for things like estate planning, insurance, or investing. At BP Appraisals, we value your property like it’s our own. Make informed decisions with confidence. Don’t settle for less. Choose the experts at BP Appraisals LLC, where precision meets professionalism. Visit us today at bpappraisalsllc.com and schedule your appraisals in just minutes. BP Appraisals, LLC. We know what your property is worth. That’s bpappraisalsllc.com or call 720-295-0108.
SPEAKER 01 :
Are you tired of being cooped up inside during the long, cold Colorado winter? Bring a touch of warmth and greenery to your backyard with a custom greenhouse from Colorado Greenhouse Builders. Our team of experts specializes in designing and building greenhouses that will enhance any outdoor space. Our greenhouses are made with the highest quality materials and are built to withstand the harsh Colorado winters. Plus, with a variety of styles and sizes to choose from, we can create the perfect greenhouse to fit your needs and budget. Imagine growing your own fresh herbs and vegetables even during the winter or creating a beautiful garden oasis in the comfort of your own home. Don’t let the cold weather stop you from enjoying the benefits of gardening. Call Colorado Greenhouse Builders today and start planning your dream greenhouse. Colorado Greenhouse Builders. Call 720-539-9806
SPEAKER 15 :
Running an auto repair business or any small business means dealing with technology every day. But when tech issues pop up, who do you turn to? Most IT people are impatient, unreliable, and let’s be honest, kind of condescending. At Ease My Pain IT Services, we do things differently. We provide patient, reliable, friendly, rock-solid IT support so you can focus on your customers and not computer or software issues. For one affordable monthly rate, you get unlimited IT support tailored to your business needs. No surprises, no stress, just solutions. Let us ease your IT pain today. Call 303-747-6767 or visit easemypain.biz today and see what our happy clients are saying.
SPEAKER 09 :
Tailored Services Real Estate is a unique real estate company that tailors services to each individual client. At Tailored Services Real Estate, we understand that your home is more than just a place. It’s your future. That’s why we offer a personalized, hands-on approach to buying and selling homes. From consultation services to full service real estate, you can choose the services you need at an affordable cost. We take the time to understand your needs, desires and goals. Whether you’re a first-time buyer or a seasoned investor looking to upgrade your existing home or ready to downsize, Julia will create a strategy just for you. No cookie-cutter solutions, only results that fit your unique lifestyle. Julia with Tailored Services Real Estate works hard to save you money without sacrificing expertise. Julia will put her years of expertise to work for you. Experience the difference of working with an agent that listens, understands, and customizes every step tailored just for you. Visit tailoredservicesrealestate.com or call 720-383-7592 today and start your journey with a truly tailored experience.
SPEAKER 13 :
All right, we are back, Fix It Radio. And again, if you’re listening on Tuesday, thank you very much. We appreciate it very much. Today is the 15th of March. Steve Horvath from Geno’s Auto Service with us today. Brian Weary from Ease My Pain, which we’ve been talking about. A lot of things that really wanted to bring Brian on. A, to highlight him because he can help your business if you need any kind of IT services at all. Brian is your guy. And those of you listening, if you’ve got, you know, 5, 10, 15, I don’t know. What’s our max as to how many you want to work with?
SPEAKER 1 :
50?
SPEAKER 08 :
Our sweet spot’s probably 10 to 50, but we’ll do more and we will do less, but we’re in that 10 to 50 range.
SPEAKER 13 :
So if you’re somebody out there listening, you’ve got that many employees or devices even, you could have three or four employees but have 15 devices depending upon what you’re doing. Like in an auto shop, Steve’s, for example, in Steve’s world, he’s not only got desktop computers, There’s phones also that are having to be dealt with. There’s tablets that the technicians are now using to record different things on, take pictures and so on. So you might have one user using two to three different devices at any given time, meaning you could have five people and 15 or 20 devices that have to be maintained and taken care of. Right. Again, if you’re in that world, give Brian a call. He’d love to come out and take care of whatever your needs are on the business side of things. And some of you have been texting me, and I won’t give any of this out because I don’t want to do that. But some of you are texting me things in your own jobs for some pretty large companies where these were the passwords. that we used to use, and I’m looking at this like, you’ve got to be kidding me. And I know you’re not. I know you guys are being 100% honest with me, and who would imagine that Fortune 500-type companies, in this case probably Fortune 100 company, is using very simple passwords for things that you would look at and say, wait a minute, that’s like the backbone of everything we do. Why would you use such a simple password? But even big companies can be guilty of this. Correct. So what are some of the other things, Brian, you find when you’re out, especially, you know, you walk into a new business, you haven’t dealt with them before. In some cases, maybe they’ve had some IT help. Maybe they haven’t. What are some of the things you find right off the bat that need dealt with?
SPEAKER 08 :
We talked a little bit about right away. It’s backups. Just not knowing that they need a backup or they don’t know how to do it. They don’t know. You know, they’re just saving stuff on their desktop in their My Documents folder. In the Mac, they’re the same way and thinking they’re okay. And, you know, most of the time they are, but no, they’re really not. And so we talk them through that and give them options. For example, there’s such inexpensive options to do backups. Obviously, you can do an external drive. I’m not a real fan of that anymore because those hard drives can go bad. They will. They eventually will. But, for example, a plug I would use is there’s a company called Backblaze. For $99 a computer, you get unlimited backup of your data to the cloud. And they follow all the HIPAA regulations you can look through. I mean, they’re very safe.
SPEAKER 13 :
Used to use those back in the day.
SPEAKER 08 :
Did you?
SPEAKER 13 :
Yeah, before the iCloud. For those of you that are Apple users, you are familiar with the iCloud end of things and so on. And before Apple got really big on doing their quote-unquote online backups, yeah, I used them for years and years even in the business, and it’s great. It is.
SPEAKER 08 :
Works fabulous. Very inexpensive for unlimited storage. There’s other ones that are good too, which we will obviously recommend. I would say the other thing is that the protection on the – what they call the endpoint but your your computer basically your virus antivirus protection your malware protection uh many people have some some don’t it’s what they use you know i i try to get people to use uh products that are not going to slow down their computer right which a lot do a lot do uh you don’t need that over overkill um but it’s very important obviously to have protection on the endpoint or the workstation, if you plug in a USB drive, whatever, that’s important. You know what?
SPEAKER 13 :
You just mentioned something there, too. Be careful when you pick these things up, by the way. And what I mean by that is there’s a lot of folks that will even advertise their businesses and things like that that will have jump drives and things like that you go to trade shows and different things and even some of the local fairs and stuff like that and somebody may actually hand you a jump drive well here’s what i would say on that be really careful it’s not the same thing against even those individuals but stuff can get slipped into those that you need to be really careful of to your point and that’s where be careful what you’re physically plugging into your computer or network right correct
SPEAKER 08 :
Exactly. And I would say the other thing that we see with businesses, as we mentioned earlier, was multi-factor authentication. Nearly everybody has a cloud-based email system, but there’s a lot of business out there that we run into that they haven’t set up that multi-factor authentication. It’s huge to do that.
SPEAKER 13 :
Even your Gmail, Google, for all of you listening, you can do multi-factor authentication and should on even some of those simple accounts. And again, you may not have much, you know, things that you’ve stored there where it’s like, okay, if they want to see my recipes, you know, that I’ve put up to Google Docs, then let them see it. But that’s not even, you know, the idea is just don’t let them into those things. So, you know, protect yourself. And the other thing about that I think that I could say is if you get used to doing it, You’ll do that every single time, no matter what the product is you’re using. So it just becomes an automatic. Do you want you know, do you want multifactor authentication? Yes, correct. Just click yes and go through that particular process and off you go. Now, in a lot of cases, they’re going to ask you for a cell phone number or a number they can text to. because that’s another way they can do some authentication. It depends upon the company and how they’re doing things. And yes, those are okay. And that’s where, back to Joe’s point about getting some of those numbers, that’s where you never give a passcode out that may have come to you because somebody might be trying to use that multi-factor authentication. They then have your phone number some way, somehow, and they’re going to ask you for that number in return and do not ever give that number out. And if you’ve gotten that number, that means somebody’s typically trying to do something that they shouldn’t be.
SPEAKER 08 :
Correct.
SPEAKER 13 :
Now, in some cases, it could be your spouse, and if that’s the case, then they’ll tell you and they’ll say, hey, send me the code to such and such, and you know that’s exactly who it is, and off you go. But be really careful in giving that authentication code, which is what that is, in giving that out.
SPEAKER 08 :
Correct. We said earlier, I just use this all the time. If it’s suspicious, if it seems suspicious, it is. Don’t mess around. Just do not mess around.
SPEAKER 13 :
And I think we were talking during the break, and we didn’t get this out over the air, but take your tunnel vision goggles off if you see something. In other words, a lot of us know somebody we can call. You know somebody that has some resources that could help you through whatever this is to verify whether this is in fact real or not. Don’t get tunnel vision and get all scared and nervous and then just start clicking through or making phone calls or whatever. Call the people you know. Nothing is that big of an emergency that you can’t take an extra minute or two, think through the process, and make sure you’re contacting somebody that can help you with this, even if it’s a family member.
SPEAKER 14 :
And don’t be embarrassed.
SPEAKER 13 :
Yeah, don’t be embarrassed.
SPEAKER 14 :
Yeah, I think that’s the thing to come out.
SPEAKER 13 :
Yeah, for a lot of you listening, we talked about this even during one of the breaks. It seems to me, and this is just my analysis of the world, Young people are super susceptible to some of this stuff because, frankly, they’ve always had this stuff around, and they kind of get careless with it, in my opinion. Older people never had it, so they really don’t know much about it, so they tend to kind of, you know, do whatever they can, and they’re easily susceptible as well. There’s kind of that middle, which is kind of our age, where we kind of didn’t have it, then we had it, we kind of grew up through all of these changes, and we’ve kept up on it pretty well, and a lot of us, not all, but a lot of us will do okay on the technology sides of things, and even though we’re older it’s funny i’ll get young people that’ll be like do you know how to do such and such i’m like yeah i could probably teach you no offense i could probably teach you a few things about what you’re not doing because yeah i not only know how to do it but i was around before any of this stuff existed i used to do pen to paper so yes i know how to do such and such but it’s funny some of the young people will think we don’t know it when in fact brian we know more about it than most of the young people do
SPEAKER 08 :
Yep. And again, it goes back to taking your time. I said that initially, that when you, again, email, going through that, and if you get an email that’s suspicious but you’re still not sure, make the phone call or email that person. Say, did you send me this? That’s an extra few seconds to save you what could be a disaster.
SPEAKER 13 :
Yeah, and along those lines, folks, trust me, these scammers are sophisticated. They will even scam it to where it looks like it’s coming from yourself at times, where it’ll be, hey, I need to reset password such and such, or this is a message from Outlook, but yet it’s coming from, or it looks like it’s coming from yourself when in fact it’s not, and it’s a big scam. Correct. The other thing before we end, I know we’ve got just a few minutes left, also be careful of, On a lot of social media, there will be people out there pretending to be somebody that you know. They’ll pretend to be your friend. They may even copy somebody else’s entire social media profile. They’ll then reach out. They’ll talk about all things from the weather to send money to whatever or the crypto scams where they’re trying to get you to invest in things. Believe me, that is not the person you know. And to Brian’s point a moment ago, if there’s ever a question, reach out to that person and ask, hey, did you send me Such and such. As you guys can tell, a lot to talk about. We’ll have Brian back again. Never fear. He’s not going anywhere. We’ll have him back in the future. And if you’re a business needing his help, by all means, reach out. You can find him on fixitradio.com. And this is Fix It Radio, KLZ 560.
SPEAKER 11 :
The views and opinions expressed on KLZ 560 are those of the speaker, commentators, hosts, their guests, and callers. They are not necessarily the views and opinions of Crawford Broadcasting or KLZ management, employees, associates, or advertisers. KLZ 560 is a Crawford Broadcasting God and country station.