What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Account Coordinator(AC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Bedford Park, IL Businesses:
What A Few Of Our Clients Have To Say
Andromeda IT Service Offerings
Here is just a quick list demonstrating the breadth of IT services you can expect from Andromeda:
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Password Quick Tips – 6 Do’s & Don’ts Oct 30, 2020
Of course, cyber security and are hot topics, but many of you mentioned that you are interested in quick tips you can follow or use yourself.
You ask – we deliver.
Without further ado – check out these 6 quick tips for best password security practices
- Create passwords with multiple cases, symbols and numbers. Just be sure to avoid passwords such as “123456”, “qwerty”, “football”, “princess” or “password” – some of the most common passwords according to SplashData.
- Don’t create a password based on personal details such as your birth date, an anniversary, phone number, social security number etc. While not everyone may know these details about you, they are among the first a cybercriminal or evildoer will attempt when trying to hack your account. Even worse, if your password data is compromised, imagine what a cybercriminal could do with that social security information if it was exposed.
- Avoid using the same password on multiple sites. We get it, remembering different passwords for all of your different sites and needs is difficult. It is important to create something unique for every login you maintain. Remember, if a hacker gets ahold of your password for one account, the first thing they will do is try that bad boy on bank accounts, social media, emails and anywhere else they can to grab sensitive information or even your hard earned money. (Don’t worry about remembering all the different passwords, we cover that below.)
- Change your passwords regularly. We suggest changing passwords every 90 days. This can be a pain but if you maintain this practice you make getting into your accounts that much harder.
- Do Not keep a list of your passwords on your computer. Keeping a list of passwords is dangerous in any format. You open yourself up to great risk in doing so. The worst method for this is keeping a list of your passwords in a file on your computer. Instead, keep a list of each site and next to it write a specific clue that will only make sense to you. This can help jog your memory without spilling the beans if someone stumbles upon the file. (Or let a password manager create passwords for you and store them so you have them all in one place – see below.)
- Use Dual Authentication. Many apps and sites now offer dual authentication as an added security measure. Once you login to your account, you will be prompted for a code (either one you create or a randomly generated code). You put this code into the site as a second proof of your identity. This feature greatly reduces if not eliminates the likelihood of someone breaking into your accounts.
Password protection is difficult. The average Joe has anywhere from 20-200 passwords. We recognize that is a big gap but even memorizing 20 different passwords is a difficult task. With that said, we would like to provide you with a few useful tools that can free up your memory and manage your password security for you.
There are a variety of password managers on the market. We have used and enjoyed LastPass which comes with a free and premium subscription as well as an app for your phone. If you want to check out a variety of password managers and how they stack up – PC Magazine has rated them for you here.
Password Security Tests
Platforms and websites do exist that will check the security of your password. There are even some websites out there that will tell you how long a hacker would have to spend to crack your code. Check out our recommended tool here.
Email Alias Tools
We’ve found an interesting tool that can help you keep track of your passwords but also creates aliases for your email address. This is useful because without your email address, a password is essentially useless. Now, of course you don’t want someone to have your password at all but this also helps you keep your inbox clear of spam and unwanted mail.
Any of these tools can help you out. If you have any questions feel free to reach the Andromeda Team Today!
The post Password Quick Tips – 6 Do’s & Don’ts appeared first on Andromeda Technology Solutions.3 ways cloud computing helps the environment Apr 08, 2020
Celebrating Earth Day serves as a reminder of how fragile our planet is and how important it is to protect it. With a few simple changes to the way we use technology solutions at work, we can help make a big impact.
Did you know that just switching to cloud computing can help the environment? It’s true!
3 ways cloud computing helps the environment…
1. Energy Conservation.
No onsite servers can save businesses on energy usage. This is important because when you consume less power, you reduce the number of toxic fumes released by power plants, conserve the earth’s natural resources, and protect ecosystems from destruction.
Ask your technology providers about their cloud environments to learn more about different techniques these businesses take to ensure green practices in cloud computing.
2. Work Anywhere, Anytime.
When you place your work, projects, and data on the cloud it allows you and your staff to be able to work from anywhere at anytime* without driving back to the office. This saves on travel to and from the office which decreases emissions, and increases productivity.
3. Allows For A Paperless Workspace.
The cloud empowers your team to print fewer documents and collaborate using SaaS (Software as a Service) tools – meaning less paper wasted by staff. Additionally, less printing means you will use less ink and most offices won’t be upset about double cost savings here!
Have a great Earth Day and smile because you just helped save the environment.
*Some cloud solutions require an active internet connection to work
The post 3 ways cloud computing helps the environment appeared first on Andromeda Technology Solutions.New Phishing Attack Uses Unique Method To Avoid Security Nov 16, 2020
Hackers are always looking for a new angle, and recently, they've found a particularly good one.
Image recognition software is becoming increasingly sophisticated. So if hackers are interested in building a fake landing and login page designed to spoof some other company, they have to get it exactly right, including the background image, or most AV software will see through the ruse.
To get around that, some clever hackers have taken to building two different landing pages; one for the AV software and one for the user.
The page designed for the software uses the proper background image, but with the colors inverted. Image recognition software looks primarily for shapes and not for colors, so this easily fools most AV software. If a site visitor were to see that page, however, they would instantly see the flaw and become suspicious, so they're directed to a different version of the page with a proper image.
Recently, a research team attached to WMC Global had this to say about the new technique:
"Our team reviewed other campaigns deployed by this threat actor, discovering that the individual was using the same inversion technique on the newer Office 365 background."
If you're an Office 365 user, it pays to play close attention to the URL of the page you're navigating to, so you can improve your odds of avoiding inadvertently giving your login credentials to a group of hackers.
Naturally, Office 365 isn't unique in this regard. You can bet that hackers around the world are employing this trick to gain login credentials all across the internet, so vigilance is absolutely called for.
Kudos to the team at WMC Global for spotting the new trend, and make sure your IT staff is aware of the possibility so they can be on high alert and work to protect your users.