Cyclone 365

Dependable Service. Consistent Results.

With over 25 years of industry experience, we provide a wide range of IT services for small and medium-sized businesses on the Gulf Coast.

Open weekdays from 9am to 5pm.

In-person office meetings by appointment only.

End of Year Technology Review

It’s the end of another year and time to review your technology stack. One of the most important things that needs to be done annually is to look over everything you have. Do you have any aging servers, workstations, or laptops? It’s generally accepted that servers should be replaced every 4 to 6 years. Workstations and laptops are typically refreshed every 3 to 5 years. It just depends on how durable the equipment is. At a minimum, it would be advised to replace the storage media in everything you own every few years. Hard drives should be replaced with solid state drives and solid state drives should be cloned off onto new units to help prevent data loss. We can recover a failed hard drive or solid state and get your data back, but it’s expensive!

Another thing to look at is your chosen software that runs your business. As software ages, more and more security holes are discovered. When older software reaches what’s called its end-of-life, the developers cease to provide patches to shore up those security holes. This makes hacking into your technology a snap for intruders. We’ve had several of our new clients jump ship from other IT providers in the area this year. As we take them on and begin the onboarding process, the most common issues we’ve had to deal with is old, unsupported, highly vulnerable Windows servers, workstations, hardware firewalls that are unarmed for intrusion prevention, and extreme levels of HIPAA compliancy breaches. It’s no wonder we are seeing more and more successful intrusion and ransomware attacks on the Gulf Coast these days. Just because an IT provider really knew their stuff in decades past and are well-spoken in meetings doesn’t mean they have relevant security knowledge in this new day-and-age, and we’ve now seen the fallout first-hand. We also get to see what the other guys are using and it’s a good feeling to know that we’re using some of the most advanced security technology on the Gulf Coast thanks to our internal expertise combined with our globally-renowned partnerships.

Finally, it’s time to look at employee productivity. Are they utilizing your chosen technology stack in the most optimal way possible? When you spend money on IT, it can create as much as double the revenue generated by your employees, but only when they’re on-board with the changes and using the technology correctly. Make sure your people aren’t using shadow IT in their day-to-day handling of your sensitive and critical business data. Using stuff like Dropbox, personal Google Drives, and not having a way to encrypt email are all big no-no’s anymore. It’s time for that annual audit.

Has your IT provider been helping you keep up with your annual business process audits? If you only see them when there’s a problem, it might be time to start calling around to check out other options. Click to Call or Email us today. We would be happy to meet with you and discuss your needs.

What is Conditional Access?

Passwords have been a primary means of authentication for a long time, but their recommendations for length and complexity have changed over the years. Despite this, 81% of all breaches still originate from short or simple passwords. This is often due to employees choosing convenience over security. They may choose to use simple, repetitive passwords that are easy to remember, despite being warned about the dangers of this practice. This can put the organization at risk of data theft or digital vandalism.

To increase security, organizations can implement Conditional Access, which controls access to network and cloud resources based on factors other than just credentials. This includes verifying information such as IP address, geographical location, and device used during login attempts. For example, if a user attempts to log in from an unfamiliar location or device, additional authentication measures may be required. This can help prevent unauthorized access, even if a password is stolen or shared. Additionally, organizations can also enforce a password rotation policy, as well as mandatory password length and complexity requirements. Combining these security measures can provide an additional layer of protection to the organization.

If your company is concerned with the possibility of data theft or digital vandalism, click to Call or Email us today. We can help keep your company out of the bad news headlines.

Microsoft Office 365 in the Mail

Did you know that dropping a malware-infected flash drive in company parking lots is an old school tactic for breaching your business? Hackers will purposely drop a very dangerous payload in the guise of a lost, but free, flash drive on the ground in hopes that an employee will pick it up and, out of morbid curiosity, plug it into their workstation to see what’s on it. This tactic works very well, so please remember to continuously speak to your staff about these ongoing threats. Continual education and awareness is one of the cornerstones of cyber security in the office. Never plug any foreign device into a work computer under any circumstances. If you are a business owner, this goes for your home computer or laptop, as well. You don’t have to run anything on the flash drive to get infected. It happens automatically and many times it happens invisibly.

If your company is concerned with the ever-increasing threat of data theft or computer disabling ransomware, click to Call or Email us today. We can meet with you and go over your options.

Brush Up on Cyber Shopping Security Before the Holiday Blitz

Why are we talking about online shopping security now?

The holidays are still weeks away!

Well, if you don’t know how to stay safe now, then your holiday could be ruined by a hacker. Online shopping happens year-round, but we all know it ramps up come November and December. Whether you’re shopping from home or work (yeah, we know you do it!), it can be dangerous.

Scammers send you emails that look like Amazon shipping notices. They also dangle attractive ads with low prices to get your click. One click is all it takes to lose thousands of dollars to a cybercriminal. Brush up on these cyber shopping security tips before you’re rushing to score that Star Wars Lego set or PS5 and click a phishing link by mistake. Holiday-themed cyberattacks skyrocketed last year! And it’s bound to get worse in 2022.

Here are a few tips to keep you safe while shopping online:

·         Visit websites directly rather than through a link

·         Be wary of emails & social media ads promising deep discounts

·         Use a DNS filter to block malicious websites

·         Delete your credit card details right after you check out

·         Use PayPal or wallet sites to pay when possible

·         Do not shop online on an unsecured or public network

Need some help better securing your network from malicious online threats? 

Click to Call or Email us today to schedule a meeting to discuss your current and future technology needs.

Keep Those VOIP Phones Off Your Main Network

One of the less common, but well-known, attack vectors for companies are the VOIP phones. Yes, that thing sitting on your employees’ desks can be used to infiltrate your network. If intruders can get past your gateway and firewall (you DO have at least one firewall, right?!) then it is possible to attack any device that is plugged into your network whether it’s via Ethernet cable or Wi-Fi. One of the ways they can hide and record your operations is by breaching and installing their software on your VOIP phones.

Once they have something installed on a phone, they can secure an easy way in and around your network. They can also use these devices as a springboard to attack other workstations, servers, or appliances. Did you know your two-factor authentication you use when connecting to QuickBooks Online is now easily bypassed? As of this year, it’s a pretty common practice amongst digital thieves, but the first thing they need in order to start the silent mayhem is access to the inside of your network. Keep them out by segmenting your phone system away from the rest of your network. Install firewalls between departments, phones, and wireless access points, not just the Internet. Assume any device on your network could be compromised and you’re one step closer to ensuring your business stays alive for the long haul as these new times of dramatically increased small business hacking craziness continues.

Click to Call or Email us today to schedule a meeting to discuss your company’s Cybersecurity needs before it’s too late.

We provide IT support and services in and around these areas:

Mobile, AL Pensacola, FL Pascagoula, MS
Daphne, AL Fort Walton Beach, FL Gautier, MS
Fairhope, AL Destin, FL Ocean Springs, MS
Foley, AL Panama City, FL Biloxi, MS
Gulf Shores, AL Tallahassee, FL Gulfport, MS
Orange Beach, AL Lake City, FL Pass Christian, MS

★ Copyright © MMXXI. All rights reserved. ★