Cyclone 365

Dependable Service. Consistent Results.

With over 25 years of industry experience, we provide a wide range of IT services for small and medium-sized businesses on the Gulf Coast.

Open weekdays from 9am to 5pm.

In-person office meetings by appointment only.

Do You Have a Disaster Recovery Plan?

Admittedly, we harp on Cybersecurity a lot. So, here’s a change of subject:

What about the other potential dangers to your business?

If you’re running your business in the cloud (Google Drive, Microsoft OneDrive, QuickBooks Online, etc) and files or records just disappear one day, what’s the impact? Yes, sometimes the cloud has a hiccup and permanently loses stuff. It doesn’t happen often, but it does happen.

What would happen if one of your employees went rogue and altered accounting software entries, deleted documents and research, or emails? One of the easiest ways to cause a major problem is to delete or alter older, seldom needed data before they leave your organization. If it’s in the cloud and it goes unnoticed for a few months, then it’s probably gone for good.

Do you store your important files and projects on computers at your office? Maybe on individual workstations or laptops? What would happen if the device had a hard drive failure or was stolen? There’s been many a horror story from engineering firms that have had to start over on projects because of data loss. Sometimes there’s not enough time to start over and the contract is lost.

We live on the Gulf Coast. Hurricanes, tornados, floods, and fires are all on the table. If your office is destroyed, how long would it take you to get another one going? What would be lost?

All of these scenarios are taken into account when building a Disaster Recovery plan. The goal of any such playbook should be to get the business back on its feet as soon as hours or as late as a few days. All without loss of data or progress. This might mean having another network complete with ready-to-go computers on standby in another location or it might mean having a failover business model that allows everyone to Work From Home and temporarily forward office phone numbers and extensions over to personal cellphones.

Click to Call or Email us today to schedule a meeting to discuss your company’s Disaster Recovery needs.

Why Keep Rolling the Dice?

Wanna know the secret to outmatching ransomware and hackers?

Two words: Proactive cybersecurity!

Now, I know you’re probably thinking…

“What are you talking about? I’m just a small business. Am I really in danger of a cyberattack?”

A 100% yes to that!

You see, times have changed and cyber threats are becoming more and more sophisticated and cybercriminals will target anyone these days… including small businesses.  I’m sure you already know that just one data breach is enough to potentially ruin your business and the trust of all your clients!

So if I were you, I wouldn’t take this sitting down… I’d start being proactive about it!

What does that mean? It means being preventative. You take into account all potential threats and vulnerabilities. You see, traditional cybersecurity is reactive. By that, I mean your IT service provider sets up alerts so they’ll know if a cyberattack happened. But by the time they get the alert, it’s already too late… Cybercriminals already have your data.

That's why you have to be one step ahead of them and you can do that by implementing proactive cybersecurity measures in your business.

Click to Call or Email us today to schedule a meeting today if you want to know more about proactive cybersecurity.

Small Business Wake-Up Call

We’d been meaning to post this for a while now. Our primary business model is contractual by nature. We operate as a virtual employee for our partners. We do the occasional limited-scope break/fix work on the side, but our partner network always gets priority and our full resources. When onboarding new clients, one of the things we like to do is perform a security audit. And this is why:

One day, a prospective client, whose business existed in the custom flooring industry, called to report finding their accounting workstation locked with a notice that someone was currently logged in via Remote Desktop. Their accountant worked remotely most of the week, and this was normally not an unusual sight. What prompted the phone call was the fact that the accountant happened to be standing in the office at this time.

Below is a photograph of the Users with access to the accounting workstation. Besides the Administrator and Guest accounts, which were disabled, there was only one User account which was valid. The rest were created by an intruder (or intruders) to enable unadulterated access to QuickBooks and company files. This was bad. Not only was it bad, it was also too late.

The rogue accounts were added silently, using exploits predictably derived from having no IT department and no security policies and procedures in place. Simply allowing the workstation to be used both for work and for general Internet browsing by other employees led to the eventual total compromise of the system. Books, banking information, employee and customer personal information… all captured to be resold on the Dark Web.

Well, we figured out how it happened and how to stop it from continuing. But why did this happen? The management believed their business was “too small” to have to worry about Cybersecurity. My friends and fellow small business owners of the Gulf Coast, this used to be the case but times began changing several years ago. Yes, it’s still fairly unlikely this could happen to your business tomorrow, but the probability factor is quickly growing every year. This is the new criminal underworld. Eventually, your number may come up, regardless of what industry you serve. If you use Internet-connected technology in any form, the reality is you have a 24/7 target on your back.

We understand that the benefits of managed IT and Cybersecurity are largely invisible. It can seem like the money paid out isn’t justifiable as there’s no obvious manifested product. Let us assure you, while the short-term benefits may not be something that are readily seen, the long-term lack of these pillars of modern business are easily observed when things finally go sideways. Some of the social and legal consequences of being discovered as the reason why the sensitive information of your vendors, employees, or customers have been compromised and publicized can be enough to death-stroke a small business. Whether it comes in the form of a lawsuit ruling you can’t afford or a smear campaign on social media you aren’t able to ride out, the end result can be devastating at the very least.

While the expertise that Cyclone 365 offers isn’t free, as expertise never is, we are more than willing to work something out with the small and micro-businesses of the South-East. We want to see everyone’s businesses locked down, safe, and able to continue to innovate and evolve.

Click to Call or Email us today to schedule a meeting to discuss your company’s Cybersecurity needs.

Making small business fun again!

As a small business owner, I’d imagine you’ve got enough on your plate as it is!

There’s always something going on with accounts, HR, legal, sales, the workstations and servers, customer service… sometimes it feels like there’s no end to the number of hats you have to wear from time to time. Why not hand off one of those hats to someone else? Someone who would enjoy wearing it!

Companies that partner up with us all have one thing in common: They don’t need to worry about their IT anymore because we do the worrying for them.

Our job is to keep an active eye on your IT and make sure everything runs smoothly. We also make plans to help evolve or expand your business from a technology standpoint.

We work hard to find and fix problems, preferably before you even know anything was about to happen. This helps keep you from having to pick up the phone every other day and start looking for random computer techs to patch up issues they may not actually be qualified to handle. Your best bet is to just hand everything off to us and let us do our thing.

Click to Call or Email us today to schedule a meeting to discuss your company’s IT needs.

A Few Words About Windows 11

Are you excited for Windows 11? We’ve been using it for a while now and, so far, it’s pretty nice. This new version of Windows has had a facelift and looks a lot more like MacOS or certain distros of Linux. That’s a good thing in our book. Your mileage may vary, though. Either way, things are changing.

Taking cues from MacOS and Linux, there’s instant messaging (remember that?!) built into the OS. It comes in the form of Teams. You can also use widgets from the taskbar and even run Android apps. Microsoft is finally headed in, what appears to be anyway, a right direction. It’s been a while since that’s happened.

You can upgrade to Windows 11 for free at this time, but there’s a few things you’re going to need to consider before you pull the trigger:

  1. Windows 11 is unproven. When you upgrade to the latest OS, and nothing rings more true of a Microsoft OS, you will undoubtedly encounter some hidden bugs and unexpected incompatibilities. Your production environment (the computers you rely on every day at the office) is not the place to be trying out new things. If it ain’t broke, don’t fix it!

  2. Windows 11 has relatively steep requirements. Microsoft likes to tout enhanced speed and efficiency with every new OS they release. But, as history has revealed time and time again, this isn’t true. In fact, the opposite has always been true. With every iteration or update of Windows, it continues to get bulkier and slower. This means older computers will have significantly reduced performance. Just to have a decent experience, you’re going to want a relatively new PC. What with the electronics shortages still plaguing the world, expect to pay a premium on what you’re able to find on store shelves or from vendors.

  3. Windows 11 has unusual security requirements. Building off the steeper hardware requirements is a new factor: TPM chips. You’ll have to have Secure Boot coupled with a TPM chip in your computer in order to install Windows 11. These two features greatly enhance physical security of the computer while at the same time increase trackability of the hardware over the Internet. We know a few ways around these issues, but in general, you’ll need a pretty darn new PC or laptop in order to satisfy Microsoft.

Windows 11 looks like it could end up being a homerun for Microsoft. But, just like every other Windows operating system, it’s fine for Day 1 deployment on home computers and totally a bad idea to roll it out on your office network. At least, not until a good 6 months to a year have passed while they iron out the bugs.

Click to Call or Email us today to schedule a meeting to discuss your company’s IT needs.

We provide IT support and services in and around these areas:

Mobile, AL Pensacola, FL Pascagoula, MS
Daphne, AL Fort Walton Beach, FL Gautier, MS
Fairhope, AL Destin, FL Ocean Springs, MS
Foley, AL Panama City, FL Biloxi, MS
Gulf Shores, AL Tallahassee, FL Gulfport, MS
Orange Beach, AL Lake City, FL Pass Christian, MS

★ Copyright © MMXXI. All rights reserved. ★