,

Top 3 WordPress Plugins You Didn’t Even Know You Were Missing

wordpress plugins for cms website development

A Website is essential to business; whether you are a startup or a titan of industry – websites provide an essential digital impression for your consumer base. What many people do not know is that for many Content Management System-based (CMS) websites, like WordPress, there are tools available to help take your business website to the next level. In an age where almost everyone is on the internet at any given time, it is key to help promote and protect your site. Here at Andromeda, we know some of the best WordPress plugins to add-on to any WordPress website and want to share our knowledge with you.

Top 3 WordPress plugins you didn’t even know you were missing.

  1. Sucuri Security – The first in our showcase of the best WordPress plugins involved website security. If you know anything about websites, then you might have heard of Sucuri. They are the leading website security platform out there. These platforms include packages offering complete firewall protection against various types of attacks that can be harmful to websites (i.e. malware, DDoS attacks). Packages for Sucuri do cost quite a bit. However, they do have a free firewall plugin that works great as a 1st step, basic protection. Allowing for top tier firewall protection, the Sucuri plugin also has a malware scanner that you can activate at any time – providing you a respected and resourceful tool in making sure your content is secure.
  2. Yoast – Second in our WordPress plugins showcase focuses on search engine optimization, or how users find your website in search engines. Yoast is one of the better-known, and most powerful, SEO plugins out there. While they do have premium plans, their free plugin provides a guiding step for optimizing the pages and content. These steps help your website achieve higher rankings within popular search engines like Google. With very easy-to-use features and guides – Yoast provides the input you need to make sure your website is being ranked and remains competitive with direct competition.
  3. WooCommerce – And the final plugin in our WordPress plugins showcase involved eCommerce. If you are any sort of retail or resale business, you need to look into WooCommerce for your WordPress website. WooCommerce is ranked the #1 plugin for eCommerce, allowing for you to manage your inventory, sales and processing all in one convenient place. The best part? WooCommerce actually comes pre-installed for many templates, all it needs is to be activated. In order to remain competitive, it is crucial to have single inventory/processing system and WooCommerce offers just that!

There are plenty of other WordPress plugins, both free and paid. We have simply found the three described in this article very helpful and user friendly. Site Speed, Spam Prevention, and Interactive Composers – the possibilities are endless. However, don’t feel too overwhelmed. Andromeda is here for all your website needs. We can be sure to guide you in the right direction and make the changes on your behalf.

,

Integrated Security – It Does A Whole Lot More Than You Thought Part 1 (2 Part Series)

ATS Integrated Security Systems What Else Can They Do

Professional integrated security systems are important to every business. We’ve shared the different features burglar systems provide that have nothing to do with a break in , the top five reasons you should replace your traditional lock and key with an access control system, and other educational materials over the last few months. Many times, customers consider security systems as separate components:

With integrated security your solutions can work together to improve security, reduce risk and even improve productivity. That being said, we’ve decided to dedicate the next few Security Blogs to this topic.  Thru our next blog posts, we will be covering different scenarios/features that can be maximized with integrated security solutions.

Integrated Security – It Does A Whole Lot More Than You Thought

Environment Regulation – your burglar system can be equipped with special temperature sensors that will alert you if specific areas – a server room for example – exceed or dip below assigned parameters. This can save you from a great deal of hardware trouble and headache. Imagine though that with integrated security you can take this concept to an entire office building or warehouse. With integration, you can set up your facilities to monitor activity via security cameras and configure automatic lighting, heating or cooling settings for when people are present/absent. This can reduce your utility costs greatly and is an eco-friendly option for your business.

Improved Productivity – increased productivity is something everyone benefits from both personally and professionally. Traditionally, employers depended on security cameras or time clocks to monitor productivity. This was a start but hardly a way to collect data or truly motivate staff. These days software can be integrated that monitor’s user activity via the network. Keystroke logging software, web traffic logs, firewalls and other software applications can track productivity. On top of this, the data gathered show user/department trends, and any number of additional data points a company wants to gather. While some employees may grumble at the idea of close monitoring, this data can be a way for business owners to dole out promotions, bonuses and other rewards.

Visitor Management – with integrated security, visitor management for professional buildings and residential buildings is managed with software and closely monitored. No more sign in sheets, lost badges or calling up for an escort/permission (of course you can still do these things if desired). Integrated security reduces labor requirements and demands while also increasing security and protocol. A proper solution can automatically register visitors, print passes, give instructions on where to go and alert appropriate staff/persons of visitor arrival. There are even components that can be used to manage traffic flow within a facility to avoid wandering (both by foot and behind the wheel).

,

Holy Big Brother! Google Location History: An All Knowing Function You Probably Didn’t Know You’ve Enabled

Google Location History - IT Networks - Big Brother is Watching

Technology has changed our world forever. What’s the first thing you do before you get out of bed in the morning? Chances are it has something to do with your smartphone. These items open up worlds of possibilities but they can also bring issues and privacy conflicts with them. For this month’s IT article we bring you an article from our President and CEO Jeff Borello on the intersection of instant access (google) and user privacy (location sharing) – focusing on something called: Google Location History. Without further ado . . .

Holy Big Brother

Have you ever heard of Google Location History?

Yeah, me neither.

Let me start by saying I am not a guy that cares about intrusions on my privacy.  I don’t care if the government is listening to my phone calls or reading my Emails.  I figure I am not doing anything wrong – so if they are interested in my boring life – so be it.  Especially if it helps them catch some bad guys.

Now, with that said, even I was a little freaked out when I discovered how much Google and my Google App know about my daily movements.

These days, almost everyone has a Google login and is quite often signed into their account – especially from a mobile device.

So, let’s play a little game.  Where were you on January 17th at 4pm?  You probably don’t remember, but if you have location services enabled on your device . . . Google does.

Google Location History is a comprehensive (and by that I mean every detail imaginable) history of places you have visited as tracked and logged by your smartphone’s GPS function.  Besides being comprehensive, it also has a very long memory – like years.

Give this a try to see if Google Location History is enabled on your phone.

  • From a desktop browser, go to Maps.google.com (from your phone you need to open the Google Maps App)
  • Sign in to your Google account (if you aren’t already).  Top right-hand corner will either show a Letter (first letter of your login) or a Sign In button.
  • Click the 3-bar menu in the top left corner and select “Your Timeline”
  • If you see some bar graph data there, click the bar for a given day shown from the last month.
    • How long did it take you to get to work that day?
    • Where did you have lunch?
    • Did you walk anywhere during the day?
    • Did you take any pictures?  (Yes, those might be logged in there as well)

See a screenshot below of my recent trip to Nashville.  Yep, lunch at Monell’s (great place BTW) from 12:25 to 2:06 and dinner at 9:14 at the Peg Leg Porker BBQ

Google Location History - IT Networks - IT Quick Tips

Walking, driving, flying.  It knows and records those differently.

So, the obvious question is why on earth would you want something this invasive turned on?  The answer is convenience.  As often is the case, to gain some convenience you need to give up some privacy.

It is this information that Google uses to help you throughout your day.  It will inform you of traffic issues based on your travel habits and places you may visit often.  The more information the system has on you, the more helpful an AI-powered app (Google Assistant) can be.

Okay, I have Google Location History turned on. Now what?

The good news is you do have control over this.  If you aren’t comfortable being tracked, you can turn this feature off.  From the Timeline there is an option to Pause that feature, which in effect disables it until you turn it back on.  You can also delete your entire location history as well, or just delete individual entries if you wish.

Of course, as long as the GPS is enabled on your phone, there are still plenty of apps out there that could be tracking you.  Only truly private solution is to disable the GPS completely (which probably causes you more issues than you think) or just leave your phone at home (yeah, right).

Is Google Location History too much an invasion on your privacy?  That is for you to decide but at least now you’re aware you are under the microscope.

Happy travelling.

,

Enhanced Phone Features For Enhanced Business Part 2 (3 Part Series)

Enhanced Phone Features For Enhanced Business | ATS

Last month we brought you the first portion of a three part blog series dedicated to enhanced phone features and what they can do to enhance your business. If you missed it, please check it out here. As we mentioned in our first article, your phone system can and should do a whole lot more than simply ring. There are many features that can make your day to day simpler as well as more productive. Today we area going to focus solely on hunt groups and their functionalities.

Phone Features: Hunt Groups

A Hunt Group is a collection of users, typically users handling similar types of calls, e.g. a sales department. An incoming caller wishing to speak to Sales can ring one number but any number of extensions assigned to that Hunt Group can answer the call.

There are several styles of Hunt Group and each phone system has different options. For the purpose of these examples we are going to use an Avaya IP Office phone system and the phone features available. If you would like to learn more about the different Hunt Groups available on your specific phone system, feel free to reach an Andromeda rep at (815) 836-0030.

  • Sequential

    One extension at a time rings sequentially always starting at the top of the list.

  • Collective

    All extensions in the Hunt Group ring simultaneously.

  • Rotary

    Start with the extension in the list immediately following the extension that answered the last Hunt Group call.

  • Longest Waiting

    Start with the extension that has been free for the longest time.

There are more extensive features available as well such as “Assign Call On Agent Alert” that allow for overflow or after hours call forwarding features such as night service/out of service modes. If you would like to learn more about these specific features or want to discuss how they can fit into your daily operations don’t hesitate to reach us. Feel free to fill out a contact us form or give us a quick call.

,

Do You Have A Mobile Friendly Website?
5 Reasons It Matters

Mobile Friendly Website

In 2017, smartphones are king. Almost everyone nowadays has some form of smartphone. We use them to explore video, music, and for social networking. Smartphones take advantage of practically anything the internet has to offer. Why does this matter? Well, with so many using their phones to access information on the go, mobile friendly websites are more important than ever before. It isn’t enough merely to have a website, it must be responsive to phones, tablets and other devices as well.

Before the rise in responsive websites- websites that adapt the screen size to fit whatever device they are being viewed on – most websites came as just a standard desktop website. Being mobile friendly really did not start being a real necessity for business until 2013. During that time, reports show that a substantial chunk of the user traffic came from mobile devices. In the years since, mobile search user traffic has only increased as more and more people use their smartphone and/or tablets instead of actual home computers as a primary tool for web surfing.

Don’t be left behind – 5 Reasons A Mobile Friendly Website Matters

  1. It’s becoming standard practice – more people use mobile than computer for internet searching: As the years have gone by, more and more people are using their mobile devices for their digital media as opposed to the traditional desktop computer. As of April 1, 2017 – comScore reported that 69% of digital media time is spent on mobile devices in the US. Comparing rates from a 4 year period, comScore found that there was a 26% increase in tablet viewing time compared to data recorded from 2013; a 99% increase in mobile viewing compared to 2013, and a decrease of 8% in desktop viewing compared to 2017. Researchers also found that over 8 in 10 internet users will use a smartphone to access the web regularly in 2017 (eMarketer). The amount of U.S. desktop/laptop only internet users is dwindling. Reports show that desktop usage was down from 25 million in 2015, to 18 million people in 2017. And expected to be down to 11 million desktop-only users by 2021. Meanwhile, Mobile-only internet users have grown 28% in the last two years alone, at 41 million U.S. in 2017. Mobile-viewing is becoming the standard practice in the US and that doesn’t look like it’s going away. So, you want to make sure your site can be viewed properly on mobile. Otherwise, without a mobile friendly website, you might be missing out on this growing market.
    5 Reasons A Mobile Friendly Website Matters - Growth in Digital Media Time
  2. A mobile friendly website benefits your reputation and provides for an easier user experience: Having a mobile friendly website can only improve how people view not only your website but your company branding as well. People are on the go, go, go and therefore are not using their desktops to perform appropriate searches. They are using their smartphones. Having a website with a great user interface, that is clean and easy to navigate, and provides a visual impression does wonders for a company’s reputation. Most modern sites have responsive design built in. So there’s no need for multiple versions of a website depending on what device users are using.
  3. Mobile users buy more than any other platform: While desktop still has the higher overall numbers for ecommerce, mobile users are not only catching up – they tend to spend more per transaction than traditional platforms. Users using smartphones tend to buy multiple smaller dollar transactions. While tablet users outperform desktop in overall transaction amounts – with larger purchases made via smartphones. (fastcompany)5 Reasons A Mobile Friendly Website Matters - Search is the most common starting point for mobile research
  4. Google Prioritizes mobile-friendly websites, and penalizes those who don’t: As of 2015, Google announced that it changed their searching algorithm. Websites that are not mobile friendly will not only not show up on mobile searches, but will also penalize a website so that it has lower rankings overall, even on desktop. With the vast majority of digital media users performing their searches on mobile platforms, this can critically impact a business and their customer click-thru-rate (CTR). So, unless Google sees your site as mobile friendly, chances are new potential customers are not going to be able to see your website when performing searches thru the internet’s most powerful and popular search engine.
  5. You’ll lose business if you haven’t made the switch already: You’ve probably already seen a decline in business if you still use only a standard website. If not, go with a mobile friendly website before you do. Most aren’t yet completely ditching their desktops or laptops for their mobile devices, but an increasing number are. Give your customers what they want with fast loading pages, easy navigation, and a streamlined site with great content and great products. Grab hold of that growing number of customers who use mobile devices to shop. Keep Google happy, too, and you won’t risk “disappearing” from search results.5 Reasons A Mobile Friendly Website Matters - Number of Global Digital Media Users Desktop v Mobile

How do I make my business site a mobile friendly website?

With growing trends showing increased growth in mobile viewing at a steady pace, the sooner to move to a mobile platform, the better. How do you know if you need a mobile-friendly website? You can always check with Google to see if they register your site as mobile friendly. However, sites that are 5 years or older need updating to more modern best practices – including upgrading to responsive web design. Not sure how to accomplish that? No worries, Andromeda is here to help. Our talented team of designers and developer can help you optimize your business website so that it can be reached by multitude of potential new customers. Reach out today to start a website redesign!

,

Camera Cloud Storage & Backup: The Add-On Feature Your Security Cameras Need

Security Camera Cloud Storage & Backup Add-On Feature

Security cameras are an important addition to any business. You spend so much time building your business, protecting it from threats is a top priority and you get that. There are many features and decisions you must consider when choosing the right system for your unique needs. Whether you choose IP cameras or high quality digital, whether you go with fixed view, 360 degree or PTZ (pan tilt zoom); these are just a few of the many decisions you will weigh while picking out your solution.

We help businesses design, install and maintain these systems every day. The system itself is important but there is one feature you should really consider adding when you invest in your business-grade system – camera cloud storage & backup.

The cloud is everywhere in business these days. It can host your servers, improve productivity via software and applications, even our phones are now being hosted in the clouds. With all this movement towards cloud solutions, it is no surprise that cameras and the way we manage them are now moving to the cloud as well.

Camera Cloud Storage & Backup for your security footage/data is scalable – even unlimited.

You installed your camera system. You are recording video footage. All cameras are capturing proper angles and views. A year goes by, the system is functioning properly and you haven’t had any complaints or issues. One random weekday, an employee files a complaint that their car was damaged in your parking lot. You think, “We have cameras, this won’t be an issue”. Then the employee explains that this incident occurred over a month ago. You go to look through your camera footage and realize your system only retains data for up to 30 days.

No footage – Now we have a problem.

Your on premise recording device has a maximum capacity. There is no avoiding it. Sure you can add memory or change recording settings to try and squeeze more data in. However, the reality is your hardware has limits.

Enter security camera cloud storage for your camera system. With the cloud, you gain access to an unlimited amount of storage space. This means that you can save footage for days, months, years and beyond. No worries about recording over critical moments.

Camera Cloud Storage and Backup is the disaster recovery plan for your security cameras.

We spend a lot of time helping our clients prevent disaster . The same level of attention you give your network should be paid to the other technologies your business depends on. Disaster strikes in many forms: flood, fire, malware, theft etc.

Take theft for example. A clever criminal knows that it is important to either steal or destroy your recording equipment to avoid capture. If you are storing your data and footage offsite, even though the DVR or NVR is no longer functioning, you can still view the incident and maintain footage from the event in the cloud.

Problem Solved!

Camera Cloud Storage is a budget friendly option.

Recording devices are expensive. Depending on the type of recording equipment, number of cameras, desired backlog of footage . . . a recording device can easily cost you thousands of dollars. Some expenses are unavoidable. Nevertheless, if you want a hybrid system cameras or other special features, you are going to be investing a lot on the front end in hardware. BUT, there is an alternative to expensive hardware and add on features when it comes to extending the storage capabilities of your devices – the cloud.

Camera cloud storage is much more budget friendly than adding new equipment and hardware to the equation. You can purchase as much or as little as you need to get the job done and set a specific budget aside annually.

In summary, camera cloud storage and backups are a fantastic add on to your professional security system. The cloud allows for scalability, budgeting and disaster recovery.

This month we are offering a special on cloud storage – get 2 months FREE with a one year subscription to cloud storage for your security system.

Reach out to a representative or your account manager today to discuss how this solution may be easily implemented or fill out the form below to take advantage of this promotional offer: good thru July 31st 2017.

,

5 Critical Components Any Professional Disaster Recovery Plan Must Have

disaster recovery plan IT services

We hear a whole lot about ransomware and cyber criminals these days. Andromeda helps our clients combat most data breaches with multi-tiered security solutions and employee training. But, every business is still vulnerable to incident. That is why a full proof and dependable Disaster Recovery & Business Continuity plan is an essential. Before you hit the world wide web searching for DR solutions and backup plans, take a look at these 5 critical components any professional disaster recovery plan must have.

Your disaster recovery plan should consider appropriate business continuity variables.

Disasters happen; they come in many shapes and sizes. Server crashes, accidental file deletion, physical disasters such as fire or flood and the increasingly common ransomware or malware infection are all scenarios.

You must ask two important questions yourself in regards to business continuity:

  1. How much time can pass between recovery points, ie: how much data can you afford to lose; this is commonly known in Business Continuity as RPO – Recovery Point Objective
  2. How much time can pass between the disaster and recovery, ie: how much time can you afford to lose; this is commonly known in Business Continuity as RTO – Recovery Time Objective

Ideally, your RPO and RTO are as low as possible.

A good Disaster Recovery Plan will consider these factors and have various options for restoring files, folders or even whole servers. On top of that, it is important that these options take into account minimalizing data loss and interruption.

Data should be stored both locally and offsite.

Many people have an easy time seeing the value in the offsite backup.  Whether that’s tape drives taken offsite daily, external USB drives treated the same, or data sent to the cloud for storage, it carries with it a feeling of great comfort knowing that “if the building burns down” the data is still safe.

What few realize is what we mean when we speak about downtime, for incidents that are not quite as catastrophic as a burning building. In those cases, it can take an unacceptable amount of time to get your hands on that offsite backup or to download an entire server from the cloud.

With a Disaster Recovery Plan option that offers backups both locally and offsite (cloud based), you are able to restore large quantities of files and entire server images quickly. Your onsite device should also have the capability to virtualize as a temporary server in the event your main server crashes.

Find a disaster recovery plan option that provides multiple restore options

When you think about restoring from a disaster, you may believe that so long as you have a version of your data somewhere, you are secure. In reality though, your recovery time objective can be greatly impacted by the different options available to you after a disaster. A disaster recovery plan with multiple options for virtualization, restoration and data access is an absolute must.

You may have heard the term “virtualization” before. Being able to virtualize your server either on a physical device at your location or in the cloud simply means that you have a temporary solution that will keep your business up and running while you resolve whatever issue corrupted your data, server or situation in the first place.

A catastrophic hardware failure can put your business down for hours, sometimes days. Rushing that process up can incur huge costs as well: rush delivery, emergency dispatch etc. In the event of a hardware failure, a virtual copy of your last backup can be spun up. Once completed, you can resume working swiftly. This quick recovery allows you to deal with hardware replacements, scheduling and budgets in an organized fashion.

A top tier solution will provide you with onsite virtualization and an option to virtualize in the cloud. Cloud virtualization is not as quick and can produce some lag time. Nonetheless, in the event your backups are stolen or disaster strikes your building (fire, flood etc.) – the ability to spin up and virtualize data from the cloud means that your business is not at a standstill.

Find out what type of support a vendor provides for disaster recovery plans.

Your company does not want to struggle to get their files restored.  You can’t wait hours and hours to restore a file you accidentally deleted.  Don’t wait for hours to hear back on the status of a data restore. Your IT partner should understand the solution they are providing and be able to work with you directly. Cut out the intermediary. Ensure your vendor monitors all the warranties, all the software support calls, and all monitoring; ensuring your backups are humming all day every day – as they should be.

Don’t trust just any business continuity or disaster recovery plan solution.

There are literally hundreds of options out there for Disaster Recovery. A quick Google search will give you pages of results.  Comparing them is mind numbing, and if we are being honest . . . who takes the time to do all that?  Your first step is to find an IT partner that you trust. Check their references. See if they have case studies to show how a disaster recovery functions with the product. Ask for a demonstration of the product. This is serious stuff and you need to trust the hands maintaining and protecting your data.

,

Enhanced Phone Features For Enhanced Business Part 1 (3 Part Series)

enhanced business phone features

We regularly reach out to clients for feedback on our products and service. Over the twenty plus years we have been in business, at least one thing has remained constant. Phones are a necessity for every business and professional phone systems remain a mystery to most users. Just like the other technologies in your office, your phone system changes with time and modern phone systems have many new enhanced phone features. These phone features can improve productivity, improve accessibility and assist with client relations. There are many different enhanced features available to you. With this in mind, we are bringing you a three part series focusing on enhanced phone features for enhanced business.

 4 Enhanced Phone Features You Didn’t Even Know You Needed

Twinning

The first in our phone features list is Twinning. Twinning allows a primary extension and a secondary number (extension or external) to operate together as a single telephone. When a call presents to the primary phone the secondary will ring. If the primary telephone does not ring, for example in Do Not Disturb, the secondary phone will not ring. For example, imagine you have twinning set up for your mobile phone and your office phone. When a call comes through, both phones ring so you can receive calls whether you are in the office or on the road (of course, as mentioned, you may set your phones to Do Not Disturb because you are gone for the day, or in a meeting so you aren’t interrupted by phone calls 24/7).

Internal Twinning

This next phone feature is typically used in large spaces like workshops or warehouses where team supervisors may have a desk with a fixed phone but also have a wireless extension (e.g. DECT). When a call is made from either internally twinned phone, the call will appear to have come from the primary phone (when the secondary is an extension on the IP Office system). Other users of the system need not know that the supervisor has two different phones.

Mobile (external) Twinning

A typical use for Mobile Twinning would be for a salesperson or other employee who has a desk extension but is often out of the office. They can give out one phone number to clients, but it will ring their mobile/cell phone as well as the desk extension. External mobile devices can be set as twinning targets even if the primary telephone is logged out.

Mobile Call Control

This enhanced phone feature allows a user who has answered a twinned call on their mobile phone to use features they would normally only be able to access on their desktop phone (i.e. transfer calls, park calls, conference etc.) There is traditionally a sequence such as ** (star star) that the user must enter to engage this functionality.

If any of the above look like something your business is missing, feel free to give us a call. Make sure to check back in for part 2 of the Enhanced Phone Features series next month

,

3 Add-On Functions Your Burglar Alarm System Can Provide That Have Nothing To Do With A Burglary

3 Add-On Features Your Burglar Alarm System Can Provide

A Burglary is something every business owner fears. Whether you are the owner of a retail location, restaurant, warehouse/manufacturing facility or even the owner of a B2B service based office, you are vulnerable to theft. It may be hard to imagine but it is the reality. The good news is there are protective measures available for your business and they protect you against multiple types of theft. Providing a reliable burglar alarm system, access control, camera systems, integrated security and proper IT procedures are just a few that we deal with every day.

For the purpose of this article, we want to focus on the traditional burglar system. When most people think of a burglar alarm system, they imagine a key pad at a main entrance, sensors throughout the building that detect movement, maybe a few glass break sensors etc. These are all traditional components that, when programmed by professionals who understand YOUR business, can assist you in preventing a break in.

However, where else can your professional burglar alarm system assist you? Can it do anything for the business besides catch a thief from breaking in during the middle of the night?

Of course it can!

3 Add-On Functions Your Burglar Alarm System Can Provide That Have Nothing To Do With A Burglary

Panic Button – You may install a panic button in multiple locations with many different functions:

  • A hidden switch for employees
  • Public switch for patron/employee use
  • Hand held device or lanyard for patron/employee use

This allows employees or customers in your facility to press the panic button and send a direct alert to police silently without allowing a troublemaker to know what is going on. Another use for a panic button is as an alert that someone is hurt and needs assistance.

Temperature Sensor – If you have a server room/closet, there is probably someone in charge of regulating the temperature. Equipment in those rooms is temperature sensitive. If it gets too hot or too cold, your important IT and Security hardware is easily in danger of malfunction. A good burglar alarm system has sensors for temperature that can be placed in rooms such as these. You can program the panel to monitor the room. This way, the moment the temperature leaves acceptable ranges the system will alert appropriate staff before a bigger problem occurs.  A similar concept applies also to coolers or devices which store anything perishable, even medical supplies.

Water Sensor — Obviously, your IT closet has water-sensitive equipment . . . but, what fun would that same example be here? Did you know that you could use your burglar alarm system to monitor areas that are prone to leaks or standing water? You know you are thinking about that annoying sump pump. With proper placement, a water sensor connected to your burglar alarm can help you rest easy during flood seasons, heavy storms and your run of the mill-plumbing problem.

How To Acquire A Burglar Alarm System with Andromeda

There are many ways your burglar alarm system can assist your business with day-to-day function and maintenance. Sharing your concerns, specific needs and desires with an experienced burglar representative at Andromeda can not only help you sleep better at night but be more productive throughout the day.

Check out more information on our Burglar Alarm Systems and Services.

,

Your Website Got Hacked . . . Now What?

hacked website

There are few worse feelings in business than going to your website only to find it suspended due to malware or a cyber-attack. You start to wonder, “Did I do something to cause this?”, “Why was my website hacked anyway?”, and “How can I get my site back up as quickly as possible?” The answer to this is simpler than you might believe, cyber criminals and hackers do not discriminate. You have data . . . data is valuable . . . they want cash.

Website security is a necessity for its health but most importantly, security is important because it creates trust for both your user and major search engines. A website that crashes due to malware attacks can cause the hacked website to become ‘blacklisted’ – meaning, search engines will not show the site in searches as not to infect users.

So what should you do if your website falls victim to hacking? Well, follow these steps and they should get your website back up-and-running in no time.

5 Steps for getting your hacked site back online after malicious infection attempt

  1. Run an anti-virus scan on your computer – Sometimes, hackers get into websites thru a hack on a local machine. Once allowed access into your machine, the hacker can watch your activity, gain access to passcodes and gather other vital security information. Before you do anything to fix the attack on your website, run an anti-virus scan on your local machine to make sure it is clean and safe to use.
  2. Change all passwords on all accounts– The next thing you will want to do is change all passcodes associated with your website account. This will mean CMS (content management system) template passwords, FTP passwords, and cpanel passwords (if your server has access to a cpanel). If your site is down due to a hacked system, you can reach out to server support. They can assist you with whitelisting your IP so you can make the necessary changes and perform the necessary cleaning. As mentioned in step 1, hackers get access to your site by stealing password information, by changing passwords; you remove their access to the site.
  3. Upgrade CMS Template to newest version– The next step is to upgrade the software for CMS template you are using for your website (*Note, if you do not use CMS, then you can skip this step). Each update executed for CMS platforms provides a security plug or patch that is necessary in order to keep your website secure. Keeping your template updated regularly can provide insurance that your site remains relatively healthy and safe. Performing regular updates is not a guarantee against hacking. However, keeping the CMS updated means there is one less hole in the template script for hackers to exploit. When updating, make sure to upgrade all plugins and themes as well.
  4. Clean out the website ­– Now comes the hard part, making sure your hacked website is completely clean. While some code might be easy to locate and remove, hacks can be quite intricate. Depending on how long a cyber-criminal had access to your site, code may be deeply buried within the core structure of your site. You’ll need to make sure to go thru it with a fine tooth comb. If you are unfamiliar with complex code, there are services and companies – including Andromeda Technology Solutions – that will assist you with this task. Once all malicious code is removed, you will need to submit the site for inspection with your server technicians.
  5. Resubmit site to search engines and increase website firewall security – Once your site is clear of vulnerabilities or malicious code, you still need to do two things:
    1. Resubmit your site to search engines if it is blacklisted – If search engines blacklisted your site, the only way to get your site viewable and searchable again is to go to the major search engines and let them know your site is clear and all hacked materials and code have been patched and/or removed. This can take a couple of days . . . be prepared.
    2. Increase the firewall prevention on your site. Once a site has been hacked, it can be slightly easier for it to become infected again. We know you don’t want that. One way to prevent a repeat attack is by increasing your website firewall. Having a proxy server that manages who and what can visit your site definitely helps. The proxy server provides an extra level of protection and deters cyber-criminal activity. Hackers and cyber bullies want to go after the lowest hanging fruit. A proxy server and beefed up firewall preventions make your site more difficult to tackle.

Seems like a lot, right? Well, don’t worry. Andromeda is here to help.

We pride ourselves in protecting clients against all kinds of threats from cyber bullies.

If website security is an area you know needs attention in your organization, fill out the form below for a promotional coupon good thru July 15th on Advanced Website Firewall and Monitoring. This service utilizes proxy servers as described above to protect your site. Additionally, our continued monitoring platform scans your site every 12 hours to ensure it is clean and clear. Rest easy at night knowing Andromeda has your back both on and off the web.

Fill Out This Form For Your Promotional Coupon Good For 2 Free Months of Advanced Website Firewall & Monitoring Services from Andromeda Technology Solutions