What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Service Coordinator(SC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Aurora, IL Businesses:
What A Few Of Our Clients Have To Say
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
5 Critical Components Any Professional Disaster Recovery Plan Must Have Jul 03, 2017
We hear a whole lot about ransomware and cyber criminals these days. Andromeda helps our clients combat most data breaches with multi-tiered security solutions and employee training. But, every business is still vulnerable to incident. That is why a full proof and dependable Disaster Recovery & Business Continuity plan is an essential. Before you hit the world wide web searching for DR solutions and backup plans, take a look at these 5 critical components any professional disaster recovery plan must have.
Your disaster recovery plan should consider appropriate business continuity variables.
Disasters happen; they come in many shapes and sizes. Server crashes, accidental file deletion, physical disasters such as fire or flood and the increasingly common ransomware or malware infection are all scenarios.
You must ask two important questions yourself in regards to business continuity:
- How much time can pass between recovery points, ie: how much data can you afford to lose; this is commonly known in Business Continuity as RPO – Recovery Point Objective
- How much time can pass between the disaster and recovery, ie: how much time can you afford to lose; this is commonly known in Business Continuity as RTO – Recovery Time Objective
Ideally, your RPO and RTO are as low as possible.
A good Disaster Recovery Plan will consider these factors and have various options for restoring files, folders or even whole servers. On top of that, it is important that these options take into account minimalizing data loss and interruption.
Data should be stored both locally and offsite.
Many people have an easy time seeing the value in the offsite backup. Whether that’s tape drives taken offsite daily, external USB drives treated the same, or data sent to the cloud for storage, it carries with it a feeling of great comfort knowing that “if the building burns down” the data is still safe.
What few realize is what we mean when we speak about downtime, for incidents that are not quite as catastrophic as a burning building. In those cases, it can take an unacceptable amount of time to get your hands on that offsite backup or to download an entire server from the cloud.
With a Disaster Recovery Plan option that offers backups both locally and offsite (cloud based), you are able to restore large quantities of files and entire server images quickly. Your onsite device should also have the capability to virtualize as a temporary server in the event your main server crashes.
Find a disaster recovery plan option that provides multiple restore options
When you think about restoring from a disaster, you may believe that so long as you have a version of your data somewhere, you are secure. In reality though, your recovery time objective can be greatly impacted by the different options available to you after a disaster. A disaster recovery plan with multiple options for virtualization, restoration and data access is an absolute must.
You may have heard the term “virtualization” before. Being able to virtualize your server either on a physical device at your location or in the cloud simply means that you have a temporary solution that will keep your business up and running while you resolve whatever issue corrupted your data, server or situation in the first place.
A catastrophic hardware failure can put your business down for hours, sometimes days. Rushing that process up can incur huge costs as well: rush delivery, emergency dispatch etc. In the event of a hardware failure, a virtual copy of your last backup can be spun up. Once completed, you can resume working swiftly. This quick recovery allows you to deal with hardware replacements, scheduling and budgets in an organized fashion.
A top tier solution will provide you with onsite virtualization and an option to virtualize in the cloud. Cloud virtualization is not as quick and can produce some lag time. Nonetheless, in the event your backups are stolen or disaster strikes your building (fire, flood etc.) – the ability to spin up and virtualize data from the cloud means that your business is not at a standstill.
Find out what type of support a vendor provides for disaster recovery plans.
Your company does not want to struggle to get their files restored. You can’t wait hours and hours to restore a file you accidentally deleted. Don’t wait for hours to hear back on the status of a data restore. Your IT partner should understand the solution they are providing and be able to work with you directly. Cut out the intermediary. Ensure your vendor monitors all the warranties, all the software support calls, and all monitoring; ensuring your backups are humming all day every day – as they should be.
Don’t trust just any business continuity or disaster recovery plan solution.
There are literally hundreds of options out there for Disaster Recovery. A quick Google search will give you pages of results. Comparing them is mind numbing, and if we are being honest . . . who takes the time to do all that? Your first step is to find an IT partner that you trust. Check their references. See if they have case studies to show how a disaster recovery functions with the product. Ask for a demonstration of the product. This is serious stuff and you need to trust the hands maintaining and protecting your data.
The post 5 Critical Components Any Professional Disaster Recovery Plan Must Have appeared first on Andromeda Technology Solutions.Andromeda’s Top Windows 10 Tips & Tricks for Increased Productivity and Ease of Use Mar 30, 2018
In our business and personal lives, we’re all racing to fit 26 hours into a 24 hour day.
Any tip or trick that shaves off time and saves a few seconds can pay off big time in the long run.
We recently did a poll around the Andromeda office to grab some of our favorite tricks and tips that save time, keep us organized and help with overall productivity.
We kept this list specific to Windows 10 but many of these tricks and features will work on older versions of Windows as well.
So – without further ado –
Andromeda’s Top Windows 10 Tips & Tricks for Increased Productivity and Ease of Use:
The snip tool is very useful when you want to grab a photo or screen shot of a specific element on your screen but don’t want to capture your entire screen.
This is a pre-installed app you can find in your start menu.
For more information on exactly how to use this function check out this helpful article.
Built In Search with Windows Key
There are a lot of different commands that begin with the ‘Windows Key’ (See above for photo example). We will dive into a few of those later but our staff thought that the built in search tool deserved its own mention.
Simply hit the Windows Key and start typing out what you are looking for. This helps avoid searching and clicking around through files.
For example hit your Windows Key and start typing any program you have installed. For our example, type in iTunes then press the Enter key.
iTunes will start automatically.
Mark Up Feature in Windows Edge
There are many different web browsers out there and most people have their favorite. Windows 10 has their own web browser called Windows Edge (an update to the classic Internet Explorer).
Once you open up a web browser with Windows Edge, locate the Mark Up Feature in the top right hand corner (highlighted below):
Once you click this feature you will notice a purple navigation bar at the top of your screen. You can now markup web pages for whatever purposes you like on any tablet or device with writing capabilities.
Pin Popular Apps to Taskbar
Windows 10 tries to make it as easy as possible to access your favorite applications and software. You can create desktop shortcuts but another accessibility option is pinning commonly used apps to your Taskbar.
Simply locate the app you are looking for and right click on it. You’ll see an option for “Add to Taskbar”. Select that and you are good to go.
This is a great way to make that Snip Tool we mentioned above more accessible.
Start Menu Organization
Some users dislike the Windows 10 start menu – but it has some great organization capabilities.
Similar to pinning apps to your Taskbar as described above, you can pin programs to your start menu. Additionally, you can group applications and software together for quick navigation.
This is all done via drag and drop. Simply click on the program you want, drag it to the right and drop it where you want.
For heavy computer users, brightness settings can cause eye strain and can even contribute to difficulty falling asleep at night.
This is because our computer screens (tablets and smartphones included) emit ‘blue light’. This blue light can be harsh on the eyes over time and messes with your natural sleep rhythms in some cases.
If you’re interested in turning on the Night Light function you can find it in the display settings menu.
“Hot Keys” are just another form of shortcut you can use to perform different functions quickly with only your keyboard.
Depending on your job and needs, you may use some, many, none or all of them (there are a ton).
Here are a few of our favorites for you to try.
Windows + L – Lock your screen
Windows + D – Show Desktop
Windows + Tab – Open Windows between Virtual Desktops
Alt + Tab – Cycle through open apps/windows
Ctrl + Z – Undo
Ctrl + X – Cut
Ctrl + V – Paste
Ctrl + C – Copy
Ctrl + A – Select All
For a more extensive list of Hot Keys check out this article from Windows Central.
We hope you found this article helpful and if you have a favorite shortcut that wasn’t listed, please let us know!
The post Andromeda’s Top Windows 10 Tips & Tricks for Increased Productivity and Ease of Use appeared first on Andromeda Technology Solutions.Apple IOS12 Users’ Photos And Contacts May Be Vulnerable Oct 12, 2018
Jose Rodriguez, a Spanish Apple enthusiast, has discovered a new security flaw to be aware of. He posted a Proof of Concept video showing the exploit in action.�
We'll say upfront that this is a highly convoluted attack involving more than two dozen discrete steps. �A hacker would need to be in possession of the phone to pull it off, so it's not something that's likely to become a major threat.
Even so, we'll provide the details below.
Apple has built in security measures that are designed to prevent someone from tricking Siri into allowing unauthorized access to the phone.� Unfortunately, by using a complex series of steps involving both Siri and Apple's Notes application, it's possible for a hacker to bypass those security measures, access images stored on the phone, and then change the image associated with a contact or the owner of the phone.
This method is effective on both iOS12 and the iOS 12.1 beta, which means that Apple's recent patch to their OS does not and will not prevent this exploit from working.� Worse, the company has yet to comment on the matter, so at this point, there's no timetable for a fix.
The independent news site Threatpost has been able to replicate the attack, so we have third-party confirmation.
Fortunately, there's a simple way to negate the attack entirely while we're waiting for a patch to close the loophole once and for all.� Simply go to Settings - Face ID & Passcode - Touch ID & Passcode, and disable the "Allow access when locked" option for Siri.
Again, it's important to reiterate that this is a highly complex attack that involves having both physical access to the device and more than two dozen steps, so this is not an issue that's likely to be widespread.� Even so, it pays to take precautions until Apple can roll out a fix.