Cyclone 365

Dependable Service. Consistent Results.

With over 25 years of industry experience, we provide a wide range of IT services for small and medium-sized businesses on the Gulf Coast.

Open weekdays from 9am to 5pm.

In-person office meetings by appointment only.

Have You Secured Your Printers?

One of the lesser-known attack vectors in a small or medium-sized company are the printers. While less common, they’re still important enough to stay on top of when it comes to cybersecurity. Why? Simple!

A modern printer, from the large copiers to the smaller office units, are complex enough to be considered a standalone computer in their own right. They have firmware, an operating system, extra memory, networking capability, wireless radios… and if you’re printing confidential information, they have an interceptable electronic copy of everything as you print it.

Just like any other electronic device, there could exist a number of known exploits that hackers can use to “jump into” the device and set up shop. Besides being able to get copies of everything your company prints, many of the newer printers are sophisticated enough that their OS can be modified and allow an intruder to launch new attacks over your network from the printer, itself. Attacks that can be tooled for breaking into your Windows workstations or servers. And we all know where that will eventually lead to!

So what do you do? Well, one of the simplest things that can be done is to check in with the printer manufacturer’s support website periodically. When they become aware of new exploits, many of these companies will release patched firmware for the printers. Download and install the latest firmware and drivers to help keep your printers secure.

There’s a number of other applicable security facets that are beyond the scope of this blog, but if you’re needing additional help getting your business secured against peripheral intrusion, click to Call or Email us today to schedule a meeting.

Do You Have a Disaster Recovery Plan?

Admittedly, we harp on Cybersecurity a lot. So, here’s a change of subject:

What about the other potential dangers to your business?

If you’re running your business in the cloud (Google Drive, Microsoft OneDrive, QuickBooks Online, etc) and files or records just disappear one day, what’s the impact? Yes, sometimes the cloud has a hiccup and permanently loses stuff. It doesn’t happen often, but it does happen.

What would happen if one of your employees went rogue and altered accounting software entries, deleted documents and research, or emails? One of the easiest ways to cause a major problem is to delete or alter older, seldom needed data before they leave your organization. If it’s in the cloud and it goes unnoticed for a few months, then it’s probably gone for good.

Do you store your important files and projects on computers at your office? Maybe on individual workstations or laptops? What would happen if the device had a hard drive failure or was stolen? There’s been many a horror story from engineering firms that have had to start over on projects because of data loss. Sometimes there’s not enough time to start over and the contract is lost.

We live on the Gulf Coast. Hurricanes, tornados, floods, and fires are all on the table. If your office is destroyed, how long would it take you to get another one going? What would be lost?

All of these scenarios are taken into account when building a Disaster Recovery plan. The goal of any such playbook should be to get the business back on its feet as soon as hours or as late as a few days. All without loss of data or progress. This might mean having another network complete with ready-to-go computers on standby in another location or it might mean having a failover business model that allows everyone to Work From Home and temporarily forward office phone numbers and extensions over to personal cellphones.

Click to Call or Email us today to schedule a meeting to discuss your company’s Disaster Recovery needs.

Why Keep Rolling the Dice?

Wanna know the secret to outmatching ransomware and hackers?

Two words: Proactive cybersecurity!

Now, I know you’re probably thinking…

“What are you talking about? I’m just a small business. Am I really in danger of a cyberattack?”

A 100% yes to that!

You see, times have changed and cyber threats are becoming more and more sophisticated and cybercriminals will target anyone these days… including small businesses.  I’m sure you already know that just one data breach is enough to potentially ruin your business and the trust of all your clients!

So if I were you, I wouldn’t take this sitting down… I’d start being proactive about it!

What does that mean? It means being preventative. You take into account all potential threats and vulnerabilities. You see, traditional cybersecurity is reactive. By that, I mean your IT service provider sets up alerts so they’ll know if a cyberattack happened. But by the time they get the alert, it’s already too late… Cybercriminals already have your data.

That's why you have to be one step ahead of them and you can do that by implementing proactive cybersecurity measures in your business.

Click to Call or Email us today to schedule a meeting today if you want to know more about proactive cybersecurity.

Small Business Wake-Up Call

We’d been meaning to post this for a while now. Our primary business model is contractual by nature. We operate as a virtual employee for our partners. We do the occasional limited-scope break/fix work on the side, but our partner network always gets priority and our full resources. When onboarding new clients, one of the things we like to do is perform a security audit. And this is why:

One day, a prospective client, whose business existed in the custom flooring industry, called to report finding their accounting workstation locked with a notice that someone was currently logged in via Remote Desktop. Their accountant worked remotely most of the week, and this was normally not an unusual sight. What prompted the phone call was the fact that the accountant happened to be standing in the office at this time.

Below is a photograph of the Users with access to the accounting workstation. Besides the Administrator and Guest accounts, which were disabled, there was only one User account which was valid. The rest were created by an intruder (or intruders) to enable unadulterated access to QuickBooks and company files. This was bad. Not only was it bad, it was also too late.

The rogue accounts were added silently, using exploits predictably derived from having no IT department and no security policies and procedures in place. Simply allowing the workstation to be used both for work and for general Internet browsing by other employees led to the eventual total compromise of the system. Books, banking information, employee and customer personal information… all captured to be resold on the Dark Web.

Well, we figured out how it happened and how to stop it from continuing. But why did this happen? The management believed their business was “too small” to have to worry about Cybersecurity. My friends and fellow small business owners of the Gulf Coast, this used to be the case but times began changing several years ago. Yes, it’s still fairly unlikely this could happen to your business tomorrow, but the probability factor is quickly growing every year. This is the new criminal underworld. Eventually, your number may come up, regardless of what industry you serve. If you use Internet-connected technology in any form, the reality is you have a 24/7 target on your back.

We understand that the benefits of managed IT and Cybersecurity are largely invisible. It can seem like the money paid out isn’t justifiable as there’s no obvious manifested product. Let us assure you, while the short-term benefits may not be something that are readily seen, the long-term lack of these pillars of modern business are easily observed when things finally go sideways. Some of the social and legal consequences of being discovered as the reason why the sensitive information of your vendors, employees, or customers have been compromised and publicized can be enough to death-stroke a small business. Whether it comes in the form of a lawsuit ruling you can’t afford or a smear campaign on social media you aren’t able to ride out, the end result can be devastating at the very least.

While the expertise that Cyclone 365 offers isn’t free, as expertise never is, we are more than willing to work something out with the small and micro-businesses of the South-East. We want to see everyone’s businesses locked down, safe, and able to continue to innovate and evolve.

Click to Call or Email us today to schedule a meeting to discuss your company’s Cybersecurity needs.

Making small business fun again!

As a small business owner, I’d imagine you’ve got enough on your plate as it is!

There’s always something going on with accounts, HR, legal, sales, the workstations and servers, customer service… sometimes it feels like there’s no end to the number of hats you have to wear from time to time. Why not hand off one of those hats to someone else? Someone who would enjoy wearing it!

Companies that partner up with us all have one thing in common: They don’t need to worry about their IT anymore because we do the worrying for them.

Our job is to keep an active eye on your IT and make sure everything runs smoothly. We also make plans to help evolve or expand your business from a technology standpoint.

We work hard to find and fix problems, preferably before you even know anything was about to happen. This helps keep you from having to pick up the phone every other day and start looking for random computer techs to patch up issues they may not actually be qualified to handle. Your best bet is to just hand everything off to us and let us do our thing.

Click to Call or Email us today to schedule a meeting to discuss your company’s IT needs.

We provide IT support and services in and around these areas:

Mobile, AL Pensacola, FL Pascagoula, MS
Daphne, AL Fort Walton Beach, FL Gautier, MS
Fairhope, AL Destin, FL Ocean Springs, MS
Foley, AL Panama City, FL Biloxi, MS
Gulf Shores, AL Tallahassee, FL Gulfport, MS
Orange Beach, AL Lake City, FL Pass Christian, MS

★ Copyright © MMXXI. All rights reserved. ★