- Long-term MSP (Managed Services Provider) for all your IT, phone, and security needs
- "Special needs" implementer to augment the day-to-day tasks of an internal technical staff (e.g., initial setup of a new server or new phone system)
- Reliable "go to" solution provider for the occasional break-fix issue (HelpDesk and dispatchable techs)
Managed IT Services
…and your budget!
In an MSP role, Andromeda offers a range of service plans—anything from month-to-month "time & materials" based assistance to fixed service contracts that permit "no-brainer" conformance to an annual budget. We even offer V.I.P. plans which permit you to "jump the queue" for HelpDesk and remote technical support assignments! Beyond the functions you would expect from a full-service MSP:
- Reliable & Fast Hybrid System Backup / Business Continuity Solutions
- Fast Data Recovery
- Network Management including 24/7/365 monitoring
- Virtual CIO role
- Security (spam control, anti-malware, containment & cleansing)
- End-to-End Internet Access & Web Hosting
- Email Account Setups, Mobile Syncing, Hosting, Archiving, and Cloud storage/services in Plainfield, IL (e.g., Microsoft Office365 setups)
- Software Application Deployment & Database Repair
- Automated Patching
...Andromeda can offer so much more: a single, expert source for a full range of physical security systems which can (and should) freely interact with your data network:
- Telephone systems—both hosted VoIP and traditional on-premises
- Building/Door Access Control
- Security Camera Systems and Video Surveillance
- Burglar Alarm System Installation & Monitoring
So, not only can we provide professional service for the full gamut of physical security needs of your growing organization, we are uniquely positioned to integrate those systems with any elements of your data and voice network. It is this integration that extracts the full power and usefulness of these systems for your organization.
- System design (for new networks or expansion of existing ones)
- Ordering/delivery/installation of network components
- In-wall & in-ceiling wiring & access boxes in new or existing structures
- Integration with your current network, security systems, alarm systems, door access…
- Computer configurations, email/network accounts, firewalls, security software…
- Complete system testing and staff training
But our job doesn't stop there. Once your network is operational, we can continue to support you with preventive maintenance packages, innovative approaches to data backup, virus and Malware control, and anti-spam solutions.
Computer Network Infrastructure – Switches, Routers and Firewalls
Having a solid network infrastructure is critical to keeping your systems running well and with minimal downtime. Truly, a $20 network switch from the retail store down the street or the guy you know that "does some wiring on the side" is not going to get you where you need to be. Neither are onsite-only or Cloud-only backup solutions!
Knowing that IT network wiring and switches are the vital backbones of your operation, Andromeda employs only experienced technicians and uses only business-class networking gear:
HP network switches • Cisco routers • Sonicwall & Netgear firewalls
WANs, VPNs – Multiple Locations and Remote Access
We specialize in extending your network beyond the four walls of your main office. This might include remote or branch offices, mobile employees or remote access from your house for voice, video, file sharing and much more!
Wireless IT networks are quite popular and are fast becoming indispensible. However, they generally cannot achieve the same level of performance as traditional wired networks where security, reliability, and bandwidth are of premium importance. Still, a wireless network is a great solution for a few roaming laptops or tablet PCs overlaying your wired office areas. To overcome the potential shortcomings of wireless, we use HP and Cisco Wireless Access Points, and we can guide you through the do’s and don’ts of implementing a wireless network to avoid the pitfalls.
Computer Network Design and Infrastructure Wiring
Whether you are adding a few offices or doing an entire build-out from the ground up, Andromeda Technology Solutions can help. We can provide infrastructure wiring for your voice, data, TV, cameras, overhead paging, etc. Having one company to handle all your wiring needs eliminates trying to coordinate vendors, minimizes labor overlap, and decreases cost.
We are also available to assist in the design of your wiring. While architects generally do a good job with this layout, we have a unique real-world approach that tends to be more in line with what is actually needed for a working office. Involving us early in the process will minimize the chance of having to run additional wires after your construction is complete…when it's much more expensive to install!
Web/Email Hosting & Web Design
"Commodity" web and email hosting seem like great solutions…until they go down OR you need to add a new account OR remove an ex-employee's access OR countless other items that need attention more regularly than you initially imagined. Ideally, your IT service that performs these functions for you should also host your web and email accounts to avoid delays, transfer issues, and any number of other potential mishaps. Andromeda is pleased to offer comprehensive hosting plans to do just that. Through our plans, you can also choose additional premium services like website hit tracking and statistics reporting.
Andromeda is also pleased to provide web design services—anything from simple informational sites to complete new site designs featuring animation/video, multi-tiered navigation, database-backed forms and social media interaction. We also have proven expertise in the art of SEO (Search Engine Optimization)—a "must" for any company that needs to generate new business leads from its on-line presence!
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Stop These 3 Hazardous File Sharing Habits Yesterday! Mar 06, 2017
File sharing is an essential portion of any business. It is the way we get information from one person to another. BUT, it can also be the way hackers gain access to your sensitive information – files or, worst of all, confidential data.
If you’re using Dropbox, OneDrive, Google Drive, or other consumer-grade file sharing and cloud sync applications – or if you depend on file sharing of any kind to run your business (hint . . . you do)- listen up!
Here are 3 habits you should break yourself and your staff of immediately.
Top 3 File Sharing Habits to Break
1) Using Consumer Grade Solutions . . .
Consumer grade solutions are just that . . . consumer grade. You aren’t a ‘consumer’, you’re a business owner with sensitive data to protect. With more and more employees/businesses depending on BYOD (Bring Your Own Device) as well as the ability to access files any time & any place, it is important that your file sharing system is professional grade. Look for enterprise grade security options like SSL Encrypted Transfer, Firewall Protection, Password Protection and Virus Scanning.
2) Emailing Files Without Proper Encryption . . .
You may not care if a hacker gets a hold of your grocery list or photos of the family dog, but when it comes to confidential data such as financial statements, medical records or other sensitive materials, it is safe to say you cannot afford criminals sniffing through your files. For this reason, NEVER send files via email without proper encryption. Business grade email and proper practices can nip this in the butt. You’d be amazed how many files fall into the laps of cyber criminals this way though.
3) Using Flash Drives…
You spend time and hard earned resources to protect your network from outside threats . . . only to destroy everything when you innocently plug in an infected flash drive you picked up innocuously enough at a trade show. Flash drives bypass security systems you have in place and may run automatically without being checked for infection by your antivirus solution. If you must continue using flash drives . . . at a minimum update your antivirus to prohibit autorun and mandate scans to all USB-attached devices when plugged into your PCs.
The post Stop These 3 Hazardous File Sharing Habits Yesterday! appeared first on Andromeda Technology Solutions.Password Quick Tips – 6 Do’s And Don’ts Oct 02, 2017
We’ve been polling our readers recently for topics of interest. Of course, cyber security and ransomware are hot topics but many of you mentioned that you are interested in quick tips you can follow or use yourself.
You ask – we deliver.
Without further ado – check out these 6 quick tips for best password practices
- Create passwords with multiple cases, symbols and numbers. Just be sure to avoid passwords such as “123456”, “qwerty”, “football”, “princess” or “password” – some of the most common passwords in 2016 according to SplashData.
- Don’t create a password based on personal details such as your birth date, an anniversary, phone number, social security number etc. While not everyone may know these details about you, they are among the first a cybercriminal or evildoer will attempt when trying to hack your account. Even worse, if your password data is compromised, imagine what a cybercriminal could do with that social security information if it was exposed.
- Avoid using the same password on multiple sites. We get it, remembering different passwords for all of your different sites and needs is difficult. It is important to create something unique for every login you maintain. Remember, if a hacker gets ahold of your password for one account, the first thing they will do is try that bad boy on bank accounts, social media, emails and anywhere else they can to grab sensitive information or even your hard earned money.
- Change your passwords regularly. We suggest changing passwords every 90 days. This can be a pain but if you maintain this practice you make getting into your accounts that much harder.
- Do Not keep a list of your passwords on your computer. Keeping a list of passwords is dangerous in any format. You open yourself up to great risk in doing so. The worst method for this is keeping a list of your passwords in a file on your computer. Instead, keep a list of each site and next to it write a specific clue that will only make sense to you. This can help jog your memory without spilling the beans if someone stumbles upon the file.
- Use Dual Authentication. Many apps and sites now offer dual authentication as an added security measure. Once you login to your account, you will be prompted for a code (either one you create or a randomly generated code). You put this code into the site as a second proof of your identity. This feature greatly reduces if not eliminates the likelihood of someone breaking into your accounts.
Password protection is difficult. The average Joe has anywhere from 20-200 passwords. We recognize that is a big gap but even memorizing 20 different passwords is a difficult task. With that said, we would like to provide you with a few useful tools that can free up your memory and manage your password security for you.
There are a variety of password managers on the market. We have used and enjoyed LastPass which comes with a free and premium subscription as well as an app for your phone. If you want to check out a variety of password managers and how they stack up – PC Magazine released their “Best Password Managers of 2017” earlier this month.
Password Security Tests
Platforms and websites do exist that will check the security of your password. There are even some websites out there that will tell you how long a hacker would have to spend to crack your code. Check out our recommended tool here .
Email Alias Tools
We’ve found an interesting tool that can help you keep track of your passwords but also creates aliases for your email address. This is useful because without your email address, a password is essentially useless. Now, of course you don’t want someone to have your password at all but this also helps you keep your inbox clear of spam and unwanted mail.
Any of these tools can help you out. If you have any questions feel free to reach the Andromeda Team Today!
The post Password Quick Tips – 6 Do’s And Don’ts appeared first on Andromeda Technology Solutions.Data Breach Costs Hilton $700,000 In Settlement Nov 10, 2017
Hilton Hotels is in hot water, having recently been fined a hefty $700,000 in an agreement with the states of New York and Vermont over the company's mishandling of a pair of recent data breaches.
According to official statements released by investigators, the company was found to have made two glaring errors: failing to maintain reasonable data security, and failing to notify victims of the data breach in a timely manner.
This second was seen as being particularly egregious, given that the company waited more than nine months before notifying its customers of the first of the two breaches. Eric T. Schneiderman, the Attorney General of the state of New York, said:
"Businesses have a duty to notify consumers in the event of a breach and protect their personal information as securely as possible.
Lax security practices like those we uncovered at Hilton put New Yorkers' credit card information and other personal data at serious risk. My office will continue to hold businesses accountable for protecting their customers' personal information."
According to the particulars of the agreement, New York State will receive $400,000 of the damages, and Vermont will receive $300,000.
The lesson here is as simple as it is painful. If you don't take proper precautions and implement reasonable security when it comes to protecting your customers' data or inform your impacted customers in a timely fashion, you'll eventually pay the consequences.
Those consequences took two forms. First and most obvious to the eye is the hefty fine itself. Although Hilton is a large corporation with deep pockets, $700,000 isn't exactly pocket change, and it's bound to sting. Second, the company lost an enormous amount of face with its customers and tarnished its image and reputation. The lost trust arising from their mishandling will take far longer to rebuild than it will for the company to make up the financial loss represented by the fine.
File this one away under how not to handle a data breach.