Cybersecurity and Protecting Your Data with AJ Jolivette of Soho

AJ Jolivette

AJ Jolivette is the Owner of Soho, a leading information technology service provider for businesses in Southern California and New York City. He is also the CTO of Joliware International, a mobile software development company. A tech enthusiast, AJ specializes in advanced tech like malware and cybersecurity, and has done cyber work for the FBI and NASA. Outside of the tech world, AJ is a blackbelt in Krav Maga, a military self-defense and fighting system.


Available_Black copy
Available_Black copy



Cybersecurity and Protecting Your Data with AJ Jolivette of Soho


In this episode…

Are you looking for expert strategies to secure and limit your data exposure on the internet? What are some of the most common mistakes businesses make when it comes to cybersecurity?

According to AJ Jolivette, security is key when it comes to your privacy and keeping data secure. He is developing and implementing tools to help you protect your most important information — and he’s here to share his key strategies and recommendations with you. So, are you ready to protect your data from a security breach?

In this episode of the Key Insights Show, Scott Johnson and AJ Jolivette, Owner of Soho, discuss protecting your information with effective privacy strategies. AJ talks about the importance of communication between clients and consultants, constructing firewalls for a safe environment, and tips for accurately measuring cyber liability insurance coverage. Stay tuned!


Here’s a glimpse of what you’ll learn:

  • AJ Jolivette talks about how the discipline and focus he’s learned translates to his technology consulting service
  • What are some ways to protect yourself from ransomware?
  • Why communication is crucial in a data consultancy role
  • AJ describes some experiences negotiating with a virtual hacker — and how to prevent it from happening to you
  • AJ recommends how to judge the right amount of cybersecurity insurance
  • What is AJ’s favorite piece of technology right now?

Resources Mentioned in this episode

    • Sponsor for this episode…

      This episode is brought to you by Key Marketing Group.


      At Key Marketing Group, we specialize in getting more inbound leads for B2B companies.

      Our proven process works time and time again to drive more potential customers to your website — and get them to contact you.


      More leads in as little as 3 months. Get started today.

      Episode Transcript

      Intro 0:02

      Welcome to the Key Marketing Podcast where we feature CEOs and how they’re thriving in today’s market. Now, let’s get started with the show.

      Scott Johnson 0:13

      Scott Johnson here I’m the host of the show where I talk with CEOs of interesting companies about challenges they’ve overcome and how they are thriving in today’s market. This episode is brought to you by key marketing group at Key Marketing Group. We specialize in getting more inbound leads for b2b companies. Our proven process works time and time again to drive more potential customers to your website and get them to contact you more leads in as little as three months. You can get started today by going to That is K e y Marketing Group dot com Our guest today is a total badass AJ Jolivette of Jolivette Business International. Renaissance man every sense of the word, Black Belt and Krav Maga tech enthusiast leading IT guy and I’m sure I’m leaving out like 10 other things. He now owns and operates Jolivette Business International High Level consulting firm that specializes in advanced tech AI machine learning blockchain crypto malware, ransomware, you name it. He does it. How’re you doing? AJ, thanks for being on the show.

      AJ Jolivette 1:15

      Doing fantastic man. Thanks for having me on the show. You got a nice thing going on here man.

      Scott Johnson 1:22

      Yeah, thanks. So AJ and I go way back and I’m fighting the urge not to call you Mr. AJ. golf instructor and you always address everyone Mr. Mr. Aj, Mr. Aj so I’m like breaking protocol by calling you AJ

      AJ Jolivette 1:39

      no AJ works man that’s that’s my professional name. I like it a lot it keeps it simple there even though people shorten it people shorten AJ to age Yeah, I’m like, you know ages already short for like three things like he was of age like he wasn’t shown enough. It’s not enough. If he

      Scott Johnson 1:57

      is too long for them. They’re just lazy. It’s really easy. So as the crop stuff going still teaching all that stuff

      AJ Jolivette  2:05

      the cross stuff is actually going amazingly well besides the fact that the school survived a pandemic and now we’re heading towards the thriving piece which is also good we’ve that we’ve added tons of programs over a black belt collective we’ve got um, we hope to just determines for UFC pass for an I’ve done two I’ve done did you do to tournament we we have added Kali I’m a certified Kali instructor with I Kali from what is Kali from Cali is Fil A Filipino martial arts with a stick knife and open hand and it’s one of the few things that Krav Maga does not dive super deep in you know we do knife defend, but knife defense is really against someone to take into a knife, but when it comes to using a knife prop doesn’t necessarily teach you that and when it comes to defending against someone who’s extremely skilled with a knife, almost everybody screwed with that. So there’s so we’ve got that and then you know, my dad became a blue belt in jujitsu, 10th planet and I’m still pushing that for so it’s awesome and all of us to make my craft better, right because I’m a I’m a Krav Maga practitioner instructor but all this just makes my job better it makes makes it better to have more more more tools to teach

      Scott Johnson 3:19

      you I remember in Krakow the the sparring was legit like you guys are looking to you know throw softballs and sparring I mean, that’s real training. So with Kali you have sticks. How are you sparring you like you know, rubber sticks or something like that? Or how does

      AJ Jolivette  3:33

      that we borrow sticks?

      Scott Johnson 3:34

      There you go. Yeah, you

      AJ Jolivette  3:36

      fix and you you put you put on headgear you put on riskier and you spar and you’re supposed to be able to have an answer for pretty much anything someone’s throwing at you. That’s the whole point. I’m moving to distance but it’s not just sticks and respond with knives. We have training knives that look and feel just like regular knives, and then we spot empty hand. Um, so yeah, no, sparring is a big deal because, like, you know, any self defense situation really is a fight. So start

      Scott Johnson 4:02

      there. Absolutely. Yeah, I remember the whole run Magog thing. Yeah, that’s the best fights you avoid. Yep. So can we give a shout out to your craft studio

      AJ Jolivette  4:12

      or Yeah, Microsoft Studios Blackbell collective. Over here in Huntington Beach. You can find them at Surf City self defense, calm 10th planet jujitsu. You can find them all over the place over 300 schools 10 planet, Brazilian Jiu Jitsu and then my Cali instructor master to Han Apollo llotja And in his second master ace there are New Jersey and that’s the to Maryland, New Jersey and of course the Philippines where they come from. So that’s that’s my people. And that’s what I do. And I love it. I just came from a knife seminar with to Han getting certified in another form of of knife.

      Scott Johnson 4:53

      That’s awesome. I find a lot of successful business owners are into martial arts.

      AJ Jolivette  4:58

      That that makes sense you know, because And it’s about discipline, right? It’s about focus. And it’s also about giving back, right? Because you any, whenever you you move up into martial arts, it’s, especially when you become a black belt, especially when you become a black belt is doing your job to give back to the art and give back to the community. And that I personally believe, and I’m not the only one that the best life lived is a life of service. And pretty much everything I’ve ever done my entire life is some form of service. And I can see that’s something that CEOs would use because they’re, they’re already in service to their employees at a minimum, at a minimum, yeah, then of course, you’re in service to your clients, depending on what you provide. But if you provide a product or you provide versus a service, that’s nothing but you’re definitely in service to your staff. Yeah, that

      Scott Johnson 5:47

      ties in with your marine roots as well, which is a whole nother thing we can get into here about go a little bit Business International. So what do you guys do?

      AJ Jolivette 5:57

      So um, because SOHO network services does entertainment and entertainment law and it for entertainment businesses, Jelena Business International branched off to provide more advanced services, because it’s one of the best ways to build a product is to listen to what the clients need, and build a product based on that. So the clients needed more advance and more guidance, more leadership, not just fix my computer and make my computer work. So and I always offer some level of consulting for those clients. But then consulting needs went up as the technology advanced and became far more complicated. As you know, right now, it’s absolutely on a whole different scale. And you start talking about blockchain and cryptocurrency and ransomware. Or to where for that matter, which is more ridiculous stuff. So what we do is we use our expertise and all those fields and our ability or aptitude to become proficient in technology that’s new faster than than a person who knows nothing about technology. So that’s one of our main strengths, does a new technology comes out, no one knows anything about it, we go learn about it, we become the expert, because we can do that fairly quickly, because we have the roots behind the technology, the root technology that started and then we offer that consulting services for clients, in which case, in many cases, I become the virtual CIO for organizations on the virtual CEO of CIO for several organizations. But then I also have ties to the FBI and to NASA, which helps give me information, FBI has taskforce that you have to be accepted into them because of my security clearance. And then so then I get the firsthand detail information about security and security issues. And then I’m entrusted with that data to a protected and to use it to help protect the the country, what types

      Scott Johnson 7:43

      of companies are in your sweet spot as far as size or industry or whatever, who really needs your services.

      AJ Jolivette  7:50

      Yeah, so it’s a very good question. So medium size businesses heading towards large, I don’t really do many small organizations, not too small. But number of uses anywhere between 50, which can be on a small end up towards 1000. Users. And then you the industry is the entertainment industry and the entertainment law, that’s a thing that’s really where it were. So who has a niche but JBI can do consulting services for pretty much any company falls into that category. And then you have people like medical organizations, I actually am CEO for a medical organization called OSPF, Arizona, which then you have to worry about public health information, and you have to worry about HIPAA and keeping that stuff secure, you have to worry about how ransomware can get access to that. And then you have to report that and there’s fines for that. So, so all so so those industries that have a niche, and a need to more secure their data protector data, protector clients, do you have us but then if you not, you’re not just worry about protecting your work, you want to utilize the technology available to you and you’re interested in? How can AI help me? What is machine learning? And can that help me with all this data that I have it? So again, that that comes to us I have developers on my staff, and I have you know, partners, obviously for for different types of cloud services and AI and machine learning and then I explained to you okay, what is it that you want to do, and then I tell you how to do that. And then if necessary, I can come on board with my services directly and then I have an entire staff of additional service from SOHO that I can then bring on if you need additional support in that area so I can cover a lot and then what I can’t cover I have partners and then my clients don’t have to deal with any of it. Right because they they have their expertise to have their focus and they can continue that focus and know that and trust that the rest I have under control what

      Scott Johnson 9:43

      usually gets them to pick up the phone and call you is it they’re facing some big issue or is it they don’t know what they don’t know when they’re hiring you for an audit like is it does it usually start in crisis mode? Or you know, you just come in and see the lay of the land?

      AJ Jolivette  9:56

      It’s good question. So um, so usually it I get The US Dollar to crisis mode when first that was easy, because when it’s broken, people are willing to do anything to get it fixed. So and they’ll, they’ll, they’ll come come free. And they’ll come for support. So crisis mode is easy. But then it’s it’s word of mouth. So someone in the industry, because a lot of the industries I work with are closed, they don’t, because of the nature of their business, they’re not out there advertised for someone to come in, because you have to already be accepted in deed and be dealing with him. So I get passed around a lot. Because like, I’m your mom, Judy. Love, Judy. Identify my mom. Yeah, when she did the marketing for the company. She Monique, she asked me what do we do and she came up with it, you can trust. So who it you can trust. And that’s what it comes down to these people that work with us. We have their trust, we maintain their trust. So they pass us to people who trust them. And then then it comes to the consulting side, people reach out to me because they kind of know what I’m doing. I’m out there on the internet. I’m out there in the world. So I’m not hard to find. Any Google search will pop me up. AJ gelatin, there I am. So they find me that way too, because I’m actually available to everyone.

      Scott Johnson 11:17

      What’s some kind of useful info we could share with the listeners? Like other than, you know, hiring you for it? What is some low hanging fruit that you find a lot of them aren’t doing? It’s like, Hey, guys, you should at least be doing this these basic protection things.

      AJ Jolivette  11:30

      Okay. So security, security, security, the security, the exploit market of security of hacking, and taking advantage of people’s weaknesses is a trillion dollar market space, trillions. And if you think about what organizations work in the trillion dollar space, it’s these people, hackers, exploiters, hacking groups and governments. That’s it. So that’s how big of a deal it is, you should at least be using multi factor authentication, two factor authentication for your security for your past, you should at least have your data existing and at least three places backed up and one of those should be completely offline and not touchable. Because that’s the real protection from from ransomware. Having your data anyway. You should absolutely change your passwords and keep them very complicated and use a password manager or a system like one pass or LastPass or something like that. So that your passwords are complicated, and they’re not easy to to to guess based on your username, you should definitely not use the same username for every place you go. These you should focus on security because you are target all of us are targets because it is too easy. People stop really I mean, the system, they’re not really designed to hack systems. The programs are designed to hack people because we’re real easy to hack.

      Scott Johnson 12:53

      Yeah, I was just gonna ask is it typically bots? Is it people intentionally using machines? Or is it people intentionally picking up the phone? And I’m sure there’s terminology packing people, you know that the answer is yes. All the above? Is this like a spray and pray? Or is it typically I’m targeting this copper, these guys are targeting this

      AJ Jolivette  13:10

      company. So that at first it was like a spray and pray because that was that was all that was there looking at IP addresses, but not anymore. Now there’s so many companies with large databases have been exploited. And the dark web is is is so saturated with your information. You’ve got companies that have had, like a billion users data lost a billion. Think about that there’s 7 billion people on the planet. So you’ve got organization that has lost some form of data. So more than likely, your data is out there somewhere. So they’re just selling it in packages. I literally I mean, packages, like you can buy a package like like he like zero click prep programs, like Pegasus, and Dino Pegasus is

      Scott Johnson 14:01

      now flying unicorn and stuff like that.

      AJ Jolivette 14:05

      Yeah, it’s a flying horse. All right. A unicorn.

      Scott Johnson 14:08

      My daughter’s all about. I don’t know what you’re talking about when you say Pegasus.

      AJ Jolivette  14:11

      Yeah. Okay. So practice is the application that’s a zero click or a zero day application for XSplit. What that means is you don’t have to do anything but have a device let’s say an iPhone, all you have to do is have an iPhone, and they can send a message, make a phone call, or send a whatsapp notification to you. And you don’t have to answer it, click it, pick it nothing. Just the fact they sent it to you. They have full access to your device. That means zero that’s a zero click they now do not do anything. And this was practices were created by by a company in Israel, but that is terrifying. It is terrifying. Companies online. You know, it’s

      Scott Johnson 14:49


      AJ Jolivette  14:50

      this is a thing. This is a real thing. Um, so understanding how Paramount it is to protect yourself even though there’s very little protection you Do against something like that, um, other than to do the latest updates that that Apple has put out, don’t use programs that are actually vulnerable to it like WhatsApp, which is one of the main ones that’s horrible to it or was vulnerable to it probably still is.

      Scott Johnson 15:13

      I’m deleting that right now. Yeah, it’s, it’s, um,

      AJ Jolivette 15:15

      you know, so the low hanging fruit is security protection of yourself and your clients. And you don’t want people to take it lightly. Because the entire entire organizations that are built just for that only,

      Scott Johnson 15:31

      so let’s say a company isn’t at the 50 employee range, yet. They have 10 employees, 20 employees, maybe they understood some of that, but half of it was over their head, like me, um, what do you recommend? Is there some sort of service, you know, to hire or what, what’s the best approach from there,

      AJ Jolivette 15:49

      right. So for small clients from for what I can provide for small clients that have a really small service package, that is a remote only support package that gives them access to my expertise, my expert, expert technicians and people. And it’s small, it’s meant like an incubator thing. And then I have partners, like I have a company called it by the hour that I work with, and it by the hour does stuff I don’t do they do the smaller things. So either way I get you support, I’m not gonna leave anyone waffling. Right. Um, one of the funny things is, though, you know, people hired me to fix their problems, or to tell them what to do. And then often they don’t do that. So they’re hot, though. They’ll hire me and say, Okay, I’m the heart. So they’re hard jVi and say, so how do I fix this problem? Or what is this? And I said, Okay, well, this is broken by this. And this is what’s going to happen if you don’t do this soon. So these are the systems you should put in place. And I’ll say, you know, I don’t think that’s what it is. Like, okay, well, what do you think it is, I think, is this, I said, it’s, this is why it’s not that, and this is what you should do? And they said, Okay, well, we’re gonna hire you. Um, but don’t do that. Because that’s not what the problem really is. It’s just go fix this. And I have them sign a waiver, and then I go fix the thing that’s not broken. And then it all implodes. And then they say, Yeah, you were right. Can you fix that now? And I’m like, Yep, I’ll go fix that, too. So, um, believe it or not just being humble. And sometimes you have to give people what they want. And sometimes you have to give them what they need. And it’s not necessarily the same thing, actually, very rarely is the same thing. But ultimately, you just want to be clear in your communication. And so so when you have, like, small organizations are the reason I mentioned because smaller organizations are notorious for that. They’re notorious for telling you how to fix what they hired you to fix. So abuses,

      Scott Johnson 17:51

      we get that all the time in the SEO world, dude, like, oh, all the time. someone’s like, yeah, I need a new website. And we look at it’s like your website’s, actually, okay, your content and marketing just suck. Let’s just do really good content, target keywords, do all this stuff. And the leads are gonna come in, like, No, I want a website. It’s like, all right, you could, you know, build any wordpress site. But if your content sucks, you’re not going to get a business out of it.

      AJ Jolivette  18:14

      Exactly. That’s exactly what I’m talking about. That’s, that’s it right there. Right there. You don’t trust your, your, your set of eyes. Oh, they already had a pre planned thing that they want. And you’re like, Okay, yep,

      Scott Johnson 18:26

      that’s what you want, I’m telling you. But anyway, so back to it. I know you have some war stories, what was like a crazy it issue or malware or whatever that you ran into, and you did like come to the rescue.

      AJ Jolivette  18:38

      So unfortunately, I have to deal with that all the time. When it comes to ransomware. And when it comes to malware to it, it comes in to clients, and I some of it is so bad, that I can’t even I can’t even give too much detail, because the clients are gonna know talking about them in particular, because that’s all that’s how bad some of this is. But I’ll give you some examples of some of the ransomware attacks that I’ve had to deal with. So a ransomware is just so for people who don’t know, it’s someone gets access to your data, they encrypt it, they lock it up, and then they tell you that they’re not going to open it or give it back to you unless you pay them or they take the information off of your system. And they keep it and they says well, I’ve got some very incriminating information or I have information about your clients. And I’m going to release that if you don’t pay me and those ransoms can go anywhere from between $5,000 to $50 million. And Bitcoin by the way, is that the go to they like to get played in Marino or Bitcoin but cryptocurrency that’s how they usually want to be paid is more difficult to trace. So I’ve had one of the ways that I’ve had clients exploited is the most ridiculous ways possible. Someone calls them and they say they’re Amazon. This is true. Hi, we’re Amazon. And the package you just ordered is now has an issue, I need to log into your computer so I can reset your account, make sure you get your pack. And they say, Oh crap, my Amazon package that’s so important. Let me let you into my computer, they get into the computer system. They they there’s there’s there’s lots of system exploits that are flawed because computers aren’t being updated, servers aren’t being updated, network equipment isn’t being updated. And that is the nature of being a people needing to be able to keep track of that stuff. Most people don’t update your stuff almost at all. So there’s always some vulnerability in every system. That’s just how it is. Remember, we don’t we have two people protecting our systems, we have to be right 100% of the time, the people who are attacking you, they only have to be right, once they only got to get in one.

      Scott Johnson 20:48

      I’ve always wondered how does it work? I mean, didn’t you just give them the Bitcoin or whatever the crypto is, and then they just ask for more? I mean, how can you trust these people? If you pay him the problem is going to go away?

      AJ Jolivette 20:58

      It’s very good question. So of course, that question comes up all the time. And we’ve we’ve had people need to or decide to pay ransom, or, or try to negotiate their companies. By the way, there are companies that are middle companies that negotiate for you, by the way. So there are companies that you hire, this is between you and the hackers that negotiate the terms of the money, they say, well, let’s bring it down, they want it maybe 1.5 million, they negotiate down to 750 million or negotiate down to a mount that your insurance can cover. Right, you have cybersecurity. So it’s really it’s just like anything else is a security, insurance exploit to write that they’re really going after your insurance. And they actually sometimes try to keep that fee around the area of the insurance. I’m making sense so far. Yeah, no, I, we know what they say. So they say, but these people in the middle, they will say we’ve worked with them multiple times. We’ve given them and they’ve never ever reuse it again, that I’ve I’ve had I’ve had this direct discussion before. No, we’ve worked with this hacker group, we pay them they never use the data again, and they deleted. So I can’t tell you can trust me now. But I can tell you that we’ve never had a second issue. Yeah, it makes sense.

      Scott Johnson 22:11

      I mean, these hackers need to know the person paying them can’t at least trust Yes, I pay you the problem is going to go away. Interesting. Yeah. So when you get these these prospects, let’s say someone comes to you, they’re they have 100 employees, how many of them already have cybersecurity insurance? Zero. That’s another thing for companies to think about.

      AJ Jolivette  22:30

      So I have a thing that I explained to people when it comes to security when it comes to protecting your data, and it’s based on your company’s revenue. If you’re going to lose it, if you’re going to lose

      Scott Johnson 22:45

      it, emergency, you need to

      AJ Jolivette  22:46

      get it this that that’ll never stop just by reading it, let it go away. Um, if you’re going to lose $1.5 million a week, if your systems are compromised and down, then probably don’t spend $100 to fit to make it protected. Wow. So what is your exposure? Let’s start there. How much? Are you going to lose? What? What is the danger? If your clients didn’t get out? Do you lose money? Oh, there’s your whole client. Does your whole company go under? Let’s talk about your exposure. Okay, your exposures Hi, okay, we need a really nice budget to protect that stuff. And this is what we’re going to do. And we’ll start with Yeah, we want to have cyber insurance, cybersecurity insurance, but they’re not going to secure insure you, if you have a ton of holes, they they’re gonna give you a list of questions, and you’re gonna have to answer them. And those questions are going to be like, do you have protection? Oh, we just ensuring an open door. Right? Yeah. Open volt. This is your volt have to do that. So once once you go into the process of getting cybersecurity insurance, you also have to go through the process of securing your stuff.

      Scott Johnson 23:55

      Yeah. So I guess the cheap guys out there act like you’re gonna get insurance, get the checklist to just do all that. So like we’re in the 10 to 10 employee range, roughly. We should probably have that too, right? Yeah. We’re a digital agency.

      AJ Jolivette 24:12

      Yeah, that’s right. So figure out what your exposure is. They really do start to figure out what your exposure is. And then based on how much do you lose how much you lose, if you’re down per day, how much you could get sued if your client data gets out, and then you have because that’s that value is the value you need on your cybersecurity insurance. Right? You need to know how much to get $10,000 $10 million $100 million, you need to know what that is. So what is your exposure and then and then build from there. And I’m I’m not going to recommend any particular cybersecurity company because I don’t support any of them. I’m in particular, but there are lots of them out there. One is better than the other and one is worse than the other. But you you can DESA easy Google search and review read

      Scott Johnson 24:58

      write nice Okay, cool. Well, I know we’re just about at time here, but you know, you’re in such a fast moving industry. I mean, like, did you have mentors coming up that sort of, you know, showed you the ropes in this, you know, it defense stuff, or?

      AJ Jolivette 25:12

      Uh, yeah. So interestingly enough, I have tons of mentors that I followed over the years. And then of course, I’ve become a mentor for some people myself. And that’s not by choice that’s just by situational. But I always have people that I’m trying to catch that I’m chasing. That’s kind of my moniker even in martial arts. There’s someone I’m trying to chase. There’s a so so one of the people was a guy by the name and his good friend still Michael Frank Boise’s. He’s an executive at Google now. But I used to work for him. And my, he’s a Mensa, super intelligent person. And he would always give me very good guide in places to chase and help me understand that I have a good friend. On the technical side, his name is Dr. Knutson. He actually is a NASA rocket scientist, like literally, and he’s in charge of machine learning. And I used to before pandemic, I used to visit NASA with him once a month working on AI machine learning stuff, it’s good to environment, you’re in a great headspace. Since the pandemic, obviously I have not, but I’m bouncing ideas off of him and him going him and I going back and forth, which we do all the time. That really does shoot my clock running it really it’s like, it’s like the best fuel the best nourishment is having discussions with these people, and just brushing ideas. And then I have you know, I have peers too, that that are actually already in there, too. So

      Scott Johnson 26:38

      awesome. All right. Well, what’s a cool piece of tech that you’re super into right now? I know there’s probably a million not you.

      AJ Jolivette 26:46

      So I am currently loving, autonomous flight for passenger vehicles.

      Scott Johnson 26:53

      Of course you are.

      AJ Jolivette  26:56

      All of the new VTOL um, short distance flight systems that are coming out are mind blowing, and they’re really, really going to change transportation. And I can’t wait to get one. There’s one called the PAL V that I used to want. I think I don’t want that anymore because the technology advanced beyond that even now, but the PAL V is one of the first flying cars that you can go get. But I’m all into that. It’s amazing. They’re rethinking turbines. They’re rethinking flight. They’re rethinking aerodynamics, and it is mind blowing. I love it. I can’t wait to get one.

      Scott Johnson 27:34

      It’s awesome. How long until we find vehicles?

      AJ Jolivette  27:37

      It’s definitely vehicles now. I mean, you just got to know where to look. They were actually offering offering test flights and flying duco VTOL vertical takeoff and landing aircraft in Los Angeles for a while. But yeah, if you if you search VTOL technology coming out, you’ll get a lot of responses and hits and it’s just just watch the videos. This stuff exists right now. You can go they have range between 203 175 mile range. Um, but just awesome.

      Scott Johnson 28:12

      That’s cool. Well, thanks for being on man. It was a lot of fun. A lot of great info

      AJ Jolivette 28:16

      and thanks for having me, man. I hope I didn’t talk you

      Scott Johnson 28:19

      off. All right. Thanks, AJ.

      Outro 28:26

      Thanks for listening to the Key Marketing Podcast. We’ll see you again next time. And be sure to click Subscribe to get future episodes.